Multi-Property-Preserving Hash Domain Extension and the EMD Transform (English)
Free access
- New search for: Bellare, Mihir
- New search for: Ristenpart, Thomas
- New search for: Bellare, Mihir
- New search for: Ristenpart, Thomas
In:
Advances in Cryptology – ASIACRYPT 2006
7
;
299-314
;
2006
- Article/Chapter (Book) / Electronic Resource
-
Title:Multi-Property-Preserving Hash Domain Extension and the EMD Transform
-
Contributors:Bellare, Mihir ( author ) / Ristenpart, Thomas ( author )
-
Published in:Advances in Cryptology – ASIACRYPT 2006 , 7 ; 299-314Lecture Notes in Computer Science ; 4284, 7 ; 299-314
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2006-01-01
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Finding SHA-1 Characteristics: General Results and ApplicationsCannière, Christophe / Rechberger, Christian et al. | 2006
- 21
-
Improved Collision Search for SHA-0Naito, Yusuke / Sasaki, Yu / Shimoyama, Takeshi / Yajima, Jun / Kunihiro, Noboru / Ohta, Kazuo et al. | 2006
- 37
-
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash CollisionsContini, Scott / Yin, Yiqun Lisa et al. | 2006
- 54
-
New Guess-and-Determine Attack on the Self-Shrinking GeneratorZhang, Bin / Feng, Dengguo et al. | 2006
- 69
-
On the (In)security of Stream Ciphers Based on Arrays and Modular AdditionPaul, Souradyuti / Preneel, Bart et al. | 2006
- 84
-
Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic ImmunityLi, Na / Qi, Wen-Feng et al. | 2006
- 99
-
Secure Sketch for Biometric TemplatesLi, Qiming / Sutcu, Yagiz / Memon, Nasir et al. | 2006
- 114
-
The 2-Adic CM Method for Genus 2 Curves with Application to CryptographyGaudry, P. / Houtmann, T. / Kohel, D. / Ritzenthaler, C. / Weng, A. et al. | 2006
- 130
-
Extending Scalar Multiplication Using Double BasesAvanzi, Roberto / Dimitrov, Vassil / Doche, Christophe / Sica, Francesco et al. | 2006
- 145
-
HIBE With Short Public Parameters Without Random OracleChatterjee, Sanjit / Sarkar, Palash et al. | 2006
- 161
-
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private KeysAttrapadung, Nuttapong / Furukawa, Jun / Imai, Hideki et al. | 2006
- 178
-
On the Generic Construction of Identity-Based Signatures with Additional PropertiesGalindo, David / Herranz, Javier / Kiltz, Eike et al. | 2006
- 194
-
On the Provable Security of an Efficient RSA-Based Pseudorandom GeneratorSteinfeld, Ron / Pieprzyk, Josef / Wang, Huaxiong et al. | 2006
- 210
-
On the Security of OAEPBoldyreva, Alexandra / Fischlin, Marc et al. | 2006
- 226
-
Relationship Between Standard Model Plaintext Awareness and Message HidingTeranishi, Isamu / Ogata, Wakaha et al. | 2006
- 241
-
On the Equivalence of RSA and Factoring Regarding Generic Ring AlgorithmsLeander, Gregor / Rupp, Andy et al. | 2006
- 252
-
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based EncryptionPaillier, Pascal / Villar, Jorge L. et al. | 2006
- 267
-
A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA VariantsJochemsz, Ellen / May, Alexander et al. | 2006
- 283
-
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free PaddingChang, Donghoon / Lee, Sangjin / Nandi, Mridul / Yung, Moti et al. | 2006
- 299
-
Multi-Property-Preserving Hash Domain Extension and the EMD TransformBellare, Mihir / Ristenpart, Thomas et al. | 2006
- 315
-
Combining Compression Functions and Block Cipher-Based Hash FunctionsPeyrin, Thomas / Gilbert, Henri / Muller, Frédéric / Robshaw, Matt et al. | 2006
- 332
-
A Scalable Password-Based Group Key Exchange Protocol in the Standard ModelAbdalla, Michel / Pointcheval, David et al. | 2006
- 348
-
A Weakness in Some Oblivious Transfer and Zero-Knowledge ProtocolsNikov, Ventzislav / Nikova, Svetla / Preneel, Bart et al. | 2006
- 364
-
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret DistributionObana, Satoshi / Araki, Toshinori et al. | 2006
- 380
-
KFC – The Krazy Feistel CipherBaignères, Thomas / Finiasz, Matthieu et al. | 2006
- 396
-
Generic Attacks on Unbalanced Feistel Schemes with Contracting FunctionsPatarin, Jacques / Nachef, Valérie / Berbain, Côme et al. | 2006
- 412
-
New Cryptanalytic Results on IDEABiham, Eli / Dunkelman, Orr / Keller, Nathan et al. | 2006
- 428
-
New Approach for Selectively Convertible Undeniable Signature SchemesKurosawa, Kaoru / Takagi, Tsuyoshi et al. | 2006
- 444
-
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group SignaturesGroth, Jens et al. | 2006
- 460
-
Analysis of One Popular Group Signature SchemeCao, Zhengjun et al. | 2006