A characterization of chameleon hash functions and new, efficient designs
From MaRDI portal
(Redirected from Publication:484332)
Recommendations
Cites work
- scientific article; zbMATH DE number 176568 (Why is no real title available?)
- scientific article; zbMATH DE number 177053 (Why is no real title available?)
- scientific article; zbMATH DE number 1303133 (Why is no real title available?)
- scientific article; zbMATH DE number 2009968 (Why is no real title available?)
- scientific article; zbMATH DE number 1842501 (Why is no real title available?)
- scientific article; zbMATH DE number 1440068 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Bit commitment using pseudorandomness
- Collisions for the LPS Expander Graph Hash Function
- Cryptographic hash functions from expander graphs
- Designated verifier proofs and their applications
- Efficient signature generation by smart cards
- Faster and smoother -- VSH revisited
- Financial Cryptography
- Finding Collisions in the Full SHA-1
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
- Generalized Compact Knapsacks Are Collision Resistant
- Hash Functions from Sigma Protocols and Improvements to VSH
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- How to Break MD5 and Other Hash Functions
- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- On-line/off-line digital signatures
- Public Key Cryptography - PKC 2006
- Public Key Cryptography – PKC 2004
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Realizing Hash-and-Sign Signatures under Standard Assumptions
- SWIFFT: A Modest Proposal for FFT Hashing
- Security in Communication Networks
- Seven-Property-Preserving Iterated Hashing: ROX
- Short and Stateless Signatures from the RSA Assumption
- Theory of Cryptography
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- VSH, an Efficient and Provable Collision-Resistant Hash Function
Cited in
(12)- Chameleon hash functions and one-time signature schemes from inner automorphism groups
- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
- Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
- Financial Cryptography
- On-line/off-line DCR-based homomorphic encryption and applications
- Bringing order to chaos: the case of collision-resistant chameleon-hashes
- Hash Functions from Sigma Protocols and Improvements to VSH
- Tightly secure chameleon hash functions in the multi-user setting and their applications
- Efficient chameleon hash functions in the enhanced collision resistant model
- One-time signatures and chameleon hash functions
- Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE
- Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
This page was built for publication: A characterization of chameleon hash functions and new, efficient designs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q484332)