Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Publication:5311560

DOI10.1007/b99099zbMath1104.94025OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311560

Chun-Yuan Hsiao, Leonid Reyzin

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items (25)

Enhancements are blackbox non-trivial: impossibility of enhanced trapdoor permutations from standard trapdoor permutationsSimpler constructions of asymmetric primitives from obfuscationFully leakage-resilient signaturesOn building fine-grained one-way functions from strong average-case hardnessOn the complexity of collision resistant hash functions: new and old black-box separationsOn the (In)security of Kilian-based SNARGsOn constructing one-way permutations from indistinguishability obfuscationDoes Secure Time-Stamping Imply Collision-Free Hash Functions?Collision-resistance from multi-collision-resistanceThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelLifting standard model reductions to common setup assumptionsFinding collisions in a quantum world: quantum black-box separation of collision-resistance and one-waynessOn derandomizing Yao's weak-to-strong OWF constructionPossibility and impossibility results for selective decommitmentsBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesStructure Versus Hardness Through the Obfuscation LensNon-adaptive programmability of random oracleOn Constructing One-Way Permutations from Indistinguishability ObfuscationCCA security and trapdoor functions via key-dependent-message securityOn the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard ModelCan We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?Black-box use of one-way functions is useless for optimal fair coin-tossingUnnamed ItemToward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions




This page was built for publication: Advances in Cryptology – CRYPTO 2004