scientific article

From MaRDI portal
Publication:3792624

zbMath0647.94011MaRDI QIDQ3792624

Ivan B. Damgård

Publication date: 1988


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (35)

\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionAdaptive Succinct Garbled RAM or: How to Delegate Your DatabasePractical and provably secure release of a secret and exchange of signaturesPseudo-free families and cryptographic primitivesOn the existence of statistically hiding bit commitment schemes and fail-stop signaturesOn-line/off-line digital signaturesCramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoringKey regeneration-free ciphertext-policy attribute-based encryption and its applicationOn the complexity of collision resistant hash functions: new and old black-box separationsOn time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingA CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash FunctionDakota – Hashing from a Combination of Modular Arithmetic and Symmetric CryptographyOn time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingTime-space tradeoffs for sponge hashing: attacks and limitations for short collisionsConcealment and Its Applications to Authenticated EncryptionNew Constructions for Secure Hash FunctionsSimple hash function using discrete-time quantum walksEfficient hybrid encryption from ID-based encryptionVSH, an Efficient and Provable Collision-Resistant Hash FunctionComplexity classes of equivalence problems revisitedProving possession of arbitrary secrets while not giving them away: New protocols and a proof in GNY logicHash Functions from Sigma Protocols and Improvements to VSHLimits of Constructive Security ProofsCryptographic Hash Functions and Expander Graphs: The End of the Story?Zero-Knowledge Sets with Short ProofsAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsOn the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard ModelNon-interactive timestamping in the bounded-storage modelCharacterizing Padding Rules of MD Hash Functions Preserving Collision SecurityReducing complexity assumptions for statistically-hiding commitmentOn the Relationship Between Statistical Zero-Knowledge and Statistical Randomized EncodingsHash function based on quantum walksSecurity analysis and improvement of a double-trapdoor encryption schemeUnnamed ItemOn subset-resilient hash function families




This page was built for publication: