The following pages link to (Q3374928):
Displayed 16 items.
- New second-preimage attacks on hash functions (Q321303) (← links)
- On the complexity of the herding attack and some related attacks on hash functions (Q420639) (← links)
- On the ring-LWE and polynomial-LWE problems (Q1648786) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Construction of universal one-way hash functions: tree hashing revisited (Q2384401) (← links)
- Short signatures without random oracles and the SDH assumption in bilinear groups (Q2425530) (← links)
- Higher order eTCR hash functions (Q2629411) (← links)
- Concealment and Its Applications to Authenticated Encryption (Q3000035) (← links)
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? (Q3506390) (← links)
- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier (Q3525682) (← links)
- Digital Signatures Out of Second-Preimage Resistant Hash Functions (Q3535355) (← links)
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles (Q3600228) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders (Q3634491) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)
- Boosting Merkle-Damgård Hashing for Message Authentication (Q5387101) (← links)