Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?
From MaRDI portal
Publication:5505474
Recommendations
- Does Secure Time-Stamping Imply Collision-Free Hash Functions?
- On Provably Secure Time-Stamping Schemes
- Applied Cryptography and Network Security
- Security proofs for hash tree time-stamping using hash functions with small output size
- Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures
Cites work
- scientific article; zbMATH DE number 1820017 (Why is no real title available?)
- scientific article; zbMATH DE number 1302867 (Why is no real title available?)
- scientific article; zbMATH DE number 1303133 (Why is no real title available?)
- scientific article; zbMATH DE number 826064 (Why is no real title available?)
- scientific article; zbMATH DE number 4185033 (Why is no real title available?)
- Advances in Cryptology – CRYPTO 2004
- Applied Cryptography and Network Security
- Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators
- Does Secure Time-Stamping Imply Collision-Free Hash Functions?
- How to Time-Stamp a Digital Document
- On Provably Secure Time-Stamping Schemes
- Theory of Cryptography
Cited in
(6)- Analysis of client-side security for long-term time-stamping services
- Applied Cryptography and Network Security
- Security proofs for hash tree time-stamping using hash functions with small output size
- Does Secure Time-Stamping Imply Collision-Free Hash Functions?
- Stamp and extend -- instant but undeniable timestamping based on lazy trees
- On Provably Secure Time-Stamping Schemes
This page was built for publication: Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5505474)