scientific article
From MaRDI portal
Publication:3374928
zbMath1082.94531MaRDI QIDQ3374928
Publication date: 1 March 2006
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (16)
Higher order eTCR hash functions ⋮ New second-preimage attacks on hash functions ⋮ Construction of universal one-way hash functions: tree hashing revisited ⋮ On the ring-LWE and polynomial-LWE problems ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? ⋮ Short signatures without random oracles and the SDH assumption in bilinear groups ⋮ On the complexity of the herding attack and some related attacks on hash functions ⋮ A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier ⋮ Digital Signatures Out of Second-Preimage Resistant Hash Functions ⋮ Boosting Merkle-Damgård Hashing for Message Authentication ⋮ Concealment and Its Applications to Authenticated Encryption ⋮ On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles ⋮ How to Fill Up Merkle-Damgård Hash Functions ⋮ Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders ⋮ A Three-Property-Secure Hash Function
This page was built for publication: