Theory of Cryptography
From MaRDI portal
Publication:5901763
DOI10.1007/b95566zbMath1197.94196MaRDI QIDQ5901763
Renato Renner, Ueli M. Maurer, Clemens Holenstein
Publication date: 14 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95566
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
94A62: Authentication, digital signatures and secret sharing
Related Items
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, How to Build a Hash Function from Any Collision-Resistant Function, Multi-property Preserving Combiners for Hash Functions, Extended Multi-Property-Preserving and ECM-Construction, A simple variant of the Merkle-Damgård scheme with a permutation, An analysis of the blockcipher-based hash functions from PGV, A synthetic indifferentiability analysis of some block-cipher-based hash functions, Pseudorandomness analysis of the (extended) Lai-Massey scheme, Obfuscation for cryptographic purposes, Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications, Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles, On the Indifferentiability of Fugue and Luffa, On the Security of Hash Functions Employing Blockcipher Postprocessing, On chosen target forced prefix preimage resistance, Security Analysis of SIMD, Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model, A Domain Extender for the Ideal Cipher, Asynchronous Multi-Party Computation with Quadratic Communication, On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak, Robust Multi-property Combiners for Hash Functions Revisited, A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier, Salvaging Merkle-Damgård for Practical Applications, Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders, On the Weak Ideal Compression Functions, A Scheme to Base a Hash Function on a Block Cipher