Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model
From MaRDI portal
Publication:3092365
DOI10.1007/978-3-642-24316-5_20zbMath1298.94098OpenAlexW88692657MaRDI QIDQ3092365
Lei Wang, Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
Publication date: 16 September 2011
Published in: Provable Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-24316-5_20
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A forward-secure public-key encryption scheme
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Blockcipher-Based Hashing Revisited
- Optimal Asymmetric Encryption and Signature Paddings
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Salvaging Merkle-Damgård for Practical Applications
- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - CRYPTO 2003
- Merkle-Damgård Revisited: How to Construct a Hash Function
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
- Leaky Random Oracle (Extended Abstract)
- Theory of Cryptography
This page was built for publication: Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model