Pages that link to "Item:Q5756648"
From MaRDI portal
The following pages link to Strengthening Digital Signatures Via Randomized Hashing (Q5756648):
Displayed 20 items.
- Improved indifferentiability security bound for the JH mode (Q285241) (← links)
- New second-preimage attacks on hash functions (Q321303) (← links)
- Open problems in hash function security (Q887443) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Higher order eTCR hash functions (Q2629411) (← links)
- From 5-Pass $$\mathcal {MQ}$$-Based Identification to $$\mathcal {MQ}$$-Based Signatures (Q2953775) (← links)
- Surnaming Schemes, Fast Verification, and Applications to SGX Technology (Q2975802) (← links)
- Concealment and Its Applications to Authenticated Encryption (Q3000035) (← links)
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL (Q3399202) (← links)
- Delayed-Key Message Authentication for Streams (Q3408201) (← links)
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? (Q3506390) (← links)
- The Hash Function Family LAKE (Q3525660) (← links)
- Digital Signatures Out of Second-Preimage Resistant Hash Functions (Q3535355) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- Hash function requirements for Schnorr signatures (Q3632752) (← links)
- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders (Q3634491) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)
- Boosting Merkle-Damgård Hashing for Message Authentication (Q5387101) (← links)
- Security of Digital Signature Schemes in Weakened Random Oracle Models (Q5445458) (← links)