Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Correlated-Input Secure Hash Functions - MaRDI portal

Correlated-Input Secure Hash Functions

From MaRDI portal
Publication:3000539

DOI10.1007/978-3-642-19571-6_12zbMath1295.94075OpenAlexW1588553798MaRDI QIDQ3000539

Vanishree Rao, Adam O'Neill, Vipul Goyal

Publication date: 19 May 2011

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_12




Related Items (25)

Non-malleable functions and their applicationsAn Algebraic Framework for Pseudorandom Functions and Applications to Related-Key SecuritySecurity Against Related Randomness Attacks via Reconstructive ExtractorsFiat-Shamir and correlation intractability from strong KDM-secure encryptionTowards Forward Security Properties for PEKS and IBEEfficient RKA-Secure KEM and IBE Schemes Against Invertible FunctionsSecure Message Authentication Against Related-Key AttackThe Chaining Lemma and Its ApplicationFlexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacksEfficient Public-Key Cryptography with Bounded Leakage and Tamper ResilienceAugmented random oraclesBeyond Uber: instantiating generic groups via PGGsOn derandomizing Yao's weak-to-strong OWF constructionModeling Random Oracles Under Unpredictable QueriesSubversion-resilient signatures: definitions, constructions and applicationsBounded tamper resilience: how to go beyond the algebraic barrierRelated-key security for pseudorandom functions beyond the linear barrierNon-malleable Codes with Split-State RefreshOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsPoint-Function Obfuscation: A Framework and Generic ConstructionsA unified approach to deterministic encryption: new constructions and a connection to computational entropyRelated-key secure key encapsulation from extended computational bilinear Diffie-HellmanRobust property-preserving hash functions for Hamming distance and moreOn selective-opening security of deterministic primitivesDon't tamper with dual system encryption. Beyond polynomial related-key security of IBE




This page was built for publication: Correlated-Input Secure Hash Functions