The following pages link to Formalizing Human Ignorance (Q2876977):
Displaying 29 items.
- Concurrent knowledge extraction in public-key models (Q271592) (← links)
- Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration (Q1028435) (← links)
- One-message zero knowledge and non-malleable commitments (Q1629409) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- Random oracles and non-uniformity (Q1648794) (← links)
- State separation for code-based game-playing proofs (Q1710673) (← links)
- A cryptographic analysis of the TLS 1.3 handshake protocol (Q1983332) (← links)
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments (Q2044755) (← links)
- Lattice-based blind signatures, revisited (Q2096538) (← links)
- Critique of the related-key attack concept (Q2430685) (← links)
- Ignorance of ignorance (Q2666898) (← links)
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks (Q2958121) (← links)
- A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators (Q3098001) (← links)
- The Symbiosis between Collision and Preimage Resistance (Q3104691) (← links)
- 3-Message Zero Knowledge Against Human Ignorance (Q3179352) (← links)
- Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond (Q3181039) (← links)
- Proofs of Space (Q3457086) (← links)
- Preimage Attacks on Step-Reduced MD5 (Q3511170) (← links)
- MD4 is Not One-Way (Q3525692) (← links)
- Compression from Collisions, or Why CRHF Combiners Have a Long Output (Q3600232) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- Limits of Constructive Security Proofs (Q3600381) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)
- Interpreting Hash Function Security Proofs (Q4933215) (← links)
- Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles (Q5117380) (← links)
- Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited (Q5267415) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT (Q5918347) (← links)
- Symmetric and dual PRFs from standard assumptions: a generic validation of a prevailing assumption (Q6617632) (← links)