Pages that link to "Item:Q5429171"
From MaRDI portal
The following pages link to Constructing an Ideal Hash Function from Weak Ideal Compression Functions (Q5429171):
Displayed 10 items.
- Unavoidable regularities in long words with bounded number of symbol occurrences (Q386431) (← links)
- The universality of iterated hashing over variable-length strings (Q412371) (← links)
- Generic attacks on hash combiners (Q2188959) (← links)
- Hash Functions from Defective Ideal Ciphers (Q2790047) (← links)
- Provable Chosen-Target-Forced-Midfix Preimage Resistance (Q2889862) (← links)
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (Q3519537) (← links)
- On the Weak Ideal Compression Functions (Q3634496) (← links)
- Modeling Random Oracles Under Unpredictable Queries (Q4639493) (← links)
- Security of Digital Signature Schemes in Weakened Random Oracle Models (Q5445458) (← links)
- Leaky Random Oracle (Extended Abstract) (Q5505472) (← links)