scientific article; zbMATH DE number 1303133
From MaRDI portal
Publication:4249649
zbMATH Open0919.94032MaRDI QIDQ4249649FDOQ4249649
Authors: Daniel Simon
Publication date: 9 September 1999
Title of this publication is not available (Why is that?)
Recommendations
Cited In (85)
- On building fine-grained one-way functions from strong average-case hardness
- On the (im)plausibility of public-key quantum money from collision-resistant hash functions
- Searching for ELFs in the cryptographic forest
- Low communication complexity protocols, collision resistant hash functions and secret key-agreement protocols
- Lifting standard model reductions to common setup assumptions
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
- Can PPAD hardness be based on standard cryptographic assumptions?
- Augmented random oracles
- On the impossibility of algebraic NIZK in pairing-free groups
- Publicly-verifiable deletion via target-collapsing functions
- On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls
- Public-coin, complexity-preserving, succinct arguments of knowledge for NP from collision-resistance
- Collision Resistance from Multi-collision Resistance
- Limits of black-box anamorphic encryption
- Collision resistance from multi-collision resistance for all constant parameters
- Constant-round arguments from one-way functions
- Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols
- Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness
- Constant-round arguments for batch-verification and bounded-space computations from one-way functions
- The gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functions
- On the impossibility of algebraic vector commitments in pairing-free groups
- On subset-resilient hash function families
- How to Fill Up Merkle-Damgård Hash Functions
- Some observations on the theory of cryptographic hash functions
- Salvaging Merkle-Damgård for Practical Applications
- Compression from Collisions, or Why CRHF Combiners Have a Long Output
- Computational hardness of optimal fair computation: beyond Minicrypt
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Homomorphic evaluation requires depth
- On constructing one-way permutations from indistinguishability obfuscation
- On the ring-LWE and polynomial-LWE problems
- Infeasibility of instance compression and succinct PCPs for NP
- Toward fine-grained blackbox separations between semantic and circular-security notions
- A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
- The magic of ELFs
- Indistinguishable proofs of work or knowledge
- Towards non-black-box separations of public key encryption and one way function
- Enhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutations
- Limits on the usefulness of random oracles
- Two is a crowd? A black-box separation of one-wayness and security under correlated inputs
- Collision-free hashing from lattice problems
- Limits on the power of indistinguishability obfuscation and functional encryption
- Hash Functions from Sigma Protocols and Improvements to VSH
- Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512
- Title not available (Why is that?)
- On constructing one-way permutations from indistinguishability obfuscation
- Advances in Cryptology – CRYPTO 2004
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs
- Pseudoentropy: lower-bounds for chain rules and transformations
- Possibility and impossibility results for selective decommitments
- An analysis of the blockcipher-based hash functions from PGV
- On the gold standard for security of universal steganography
- Private coins versus public coins in zero-knowledge proof systems
- Does Secure Time-Stamping Imply Collision-Free Hash Functions?
- The journey from NP to TFNP hardness
- On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model
- Formalizing human ignorance
- Bounds on the efficiency of black-box commitment schemes
- On the impossibility of highly-efficient blockcipher-based hash functions
- Low-complexity cryptographic hash functions
- Theory of Cryptography
- On building fine-grained one-way functions from strong average-case hardness
- The Magic of ELFs
- Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
- Collision-resistance from multi-collision-resistance
- Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness
- On the complexity of collision resistant hash functions: new and old black-box separations
- A characterization of chameleon hash functions and new, efficient designs
- Structure versus hardness through the obfuscation lens
- Open problems in hash function security
- Title not available (Why is that?)
- Necessary and sufficient conditions for collision-free hashing
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?
- Concealment and its applications to authenticated encryption
- Construction of universal one-way hash functions: tree hashing revisited
- Adaptive zero-knowledge proofs and adaptively secure oblivious transfer
- Generic groups, collision resistance, and ECDSA
- On derandomizing Yao's weak-to-strong OWF construction
- The cost of adaptivity in security games on graphs
- On black-box extensions of non-interactive zero-knowledge arguments, and signatures directly from simulation soundness
- Black-box use of one-way functions is useless for optimal fair coin-tossing
- A one-way function based on norm form equations
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249649)