The following pages link to Thomas Ristenpart (Q1673387):
Displaying 28 items.
- Fast message franking: from invisible salamanders to encryptment (Q1673389) (← links)
- Message franking via committing authenticated encryption (Q1675194) (← links)
- Key rotation for authenticated encryption (Q1675197) (← links)
- A new distribution-sensitive secure sketch and popularity-proportional hashing (Q1675227) (← links)
- A fast and simple partially oblivious PRF, with applications (Q2170066) (← links)
- Asymmetric message franking: content moderation for metadata-private end-to-end encryption (Q2304921) (← links)
- Honey Encryption Beyond Message Recovery Security (Q2820506) (← links)
- The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries (Q2845685) (← links)
- Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources (Q2891509) (← links)
- Multi-instance Security and Its Application to Password-Based Cryptography (Q2914267) (← links)
- To Hash or Not to Hash Again? (In)Differentiability Results for $$H^2$$ and HMAC (Q2914269) (← links)
- A Formal Treatment of Backdoored Pseudorandom Generators (Q2948325) (← links)
- Careful with Composition: Limitations of the Indifferentiability Framework (Q3003399) (← links)
- Random Oracles with(out) Programmability (Q3058663) (← links)
- Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol (Q3102197) (← links)
- How to Enrich the Message Space of a Cipher (Q3524884) (← links)
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles (Q3600229) (← links)
- Salvaging Merkle-Damgård for Practical Applications (Q3627446) (← links)
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme (Q3627448) (← links)
- Hedged Public-Key Encryption: How to Protect against Bad Randomness (Q3650695) (← links)
- Format-Preserving Encryption (Q3651265) (← links)
- Message-Locked Encryption and Secure Deduplication (Q4924417) (← links)
- Modifying an Enciphering Scheme After Deployment (Q5267416) (← links)
- How to Build a Hash Function from Any Collision-Resistant Function (Q5387097) (← links)
- Honey Encryption: Security Beyond the Brute-Force Bound (Q5418702) (← links)
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms (Q5428826) (← links)
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks (Q5429392) (← links)
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform (Q5459086) (← links)