Strengthening Digital Signatures Via Randomized Hashing
From MaRDI portal
Publication:5756648
DOI10.1007/11818175_3zbMath1161.94443WikidataQ28016063 ScholiaQ28016063MaRDI QIDQ5756648
Publication date: 4 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11818175_3
94A62: Authentication, digital signatures and secret sharing
Related Items
Boosting Merkle-Damgård Hashing for Message Authentication, Security of Digital Signature Schemes in Weakened Random Oracle Models, Improved indifferentiability security bound for the JH mode, New second-preimage attacks on hash functions, Open problems in hash function security, Security analysis of randomize-hash-then-sign digital signatures, Higher order eTCR hash functions, From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures, Surnaming Schemes, Fast Verification, and Applications to SGX Technology, Concealment and Its Applications to Authenticated Encryption, Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL, Delayed-Key Message Authentication for Streams, How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?, The Hash Function Family LAKE, Digital Signatures Out of Second-Preimage Resistant Hash Functions, How to Fill Up Merkle-Damgård Hash Functions, On Randomizing Hash Functions to Strengthen the Security of Digital Signatures, Hash function requirements for Schnorr signatures, Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders, A Three-Property-Secure Hash Function