Correlated-Input Secure Hash Functions
From MaRDI portal
Publication:3000539
DOI10.1007/978-3-642-19571-6_12zbMath1295.94075OpenAlexW1588553798MaRDI QIDQ3000539
Vanishree Rao, Adam O'Neill, Vipul Goyal
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_12
Related Items (25)
Non-malleable functions and their applications ⋮ An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security ⋮ Security Against Related Randomness Attacks via Reconstructive Extractors ⋮ Fiat-Shamir and correlation intractability from strong KDM-secure encryption ⋮ Towards Forward Security Properties for PEKS and IBE ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ Secure Message Authentication Against Related-Key Attack ⋮ The Chaining Lemma and Its Application ⋮ Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Augmented random oracles ⋮ Beyond Uber: instantiating generic groups via PGGs ⋮ On derandomizing Yao's weak-to-strong OWF construction ⋮ Modeling Random Oracles Under Unpredictable Queries ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ Non-malleable Codes with Split-State Refresh ⋮ On the Correlation Intractability of Obfuscated Pseudorandom Functions ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Robust property-preserving hash functions for Hamming distance and more ⋮ On selective-opening security of deterministic primitives ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: Correlated-Input Secure Hash Functions