Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1303133 - MaRDI portal

scientific article; zbMATH DE number 1303133

From MaRDI portal
Publication:4249649

zbMath0919.94032MaRDI QIDQ4249649

Daniel Simon

Publication date: 9 September 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (67)

On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessComputational hardness of optimal fair computation: beyond MinicryptLimits on the usefulness of random oraclesEnhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutationsThe Journey from NP to TFNP HardnessLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionPseudoentropy: Lower-Bounds for Chain Rules and TransformationsTowards Non-Black-Box Separations of Public Key Encryption and One Way FunctionConstruction of universal one-way hash functions: tree hashing revisitedOn the gold standard for security of universal steganographyOn the ring-LWE and polynomial-LWE problemsOn building fine-grained one-way functions from strong average-case hardnessOn the complexity of collision resistant hash functions: new and old black-box separationsAn analysis of the blockcipher-based hash functions from PGVOn constructing one-way permutations from indistinguishability obfuscationOpen problems in hash function securityInfeasibility of instance compression and succinct PCPs for NPIndistinguishable Proofs of Work or KnowledgeImpossibility of indifferentiable iterated blockciphers from 3 or less primitive callsA CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash FunctionDoes Secure Time-Stamping Imply Collision-Free Hash Functions?Collision-resistance from multi-collision-resistanceThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsOn the impossibility of algebraic vector commitments in pairing-free groupsAugmented random oraclesLow communication complexity protocols, collision resistant hash functions and secret key-agreement protocolsLifting standard model reductions to common setup assumptionsOn the impossibility of algebraic NIZK in pairing-free groupsPublicly-verifiable deletion via target-collapsing functionsOn the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemesFinding collisions in a quantum world: quantum black-box separation of collision-resistance and one-waynessOn derandomizing Yao's weak-to-strong OWF constructionThe cost of adaptivity in security games on graphsPossibility and impossibility results for selective decommitmentsAdaptive zero-knowledge proofs and adaptively secure oblivious transferA characterization of chameleon hash functions and new, efficient designsConcealment and Its Applications to Authenticated EncryptionStructure Versus Hardness Through the Obfuscation LensSome observations on the theory of cryptographic hash functionsBounds on the efficiency of black-box commitment schemesCompression from Collisions, or Why CRHF Combiners Have a Long OutputHash Functions from Sigma Protocols and Improvements to VSHHow to Fill Up Merkle-Damgård Hash FunctionsInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512A Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalHomomorphic Evaluation Requires DepthOn Constructing One-Way Permutations from Indistinguishability ObfuscationCan PPAD hardness be based on standard cryptographic assumptions?A New Mode of Operation for Block Ciphers and Length-Preserving MACsPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningSalvaging Merkle-Damgård for Practical ApplicationsOn the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard ModelOn the impossibility of highly-efficient blockcipher-based hash functionsThe magic of ELFsThe Magic of ELFsTwo Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated InputsPrivate Coins versus Public Coins in Zero-Knowledge Proof SystemsBlack-Box Constructions for Fully-Simulatable Oblivious Transfer ProtocolsCan We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?Generic groups, collision resistance, and ECDSAFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsBlack-box use of one-way functions is useless for optimal fair coin-tossingUnnamed ItemToward Fine-Grained Blackbox Separations Between Semantic and Circular-Security NotionsOn subset-resilient hash function families




This page was built for publication: