Author:
Bagheri Nasour,Gauravaram Praveen,Knudsen Lars R.,Zenner Erik
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference21 articles.
1. Bellare, M., Canetti, R., Krawczyk, H.: Pseudorandom functions revisited: the cascade construction and its concrete security. In: Proceedings of the 37th Annual IEEE Symposium on Foundations of Computer Science, FOCS’96, pp. 514–523. IEEE Computer Society, IEEE Computer Society Press (1996)
2. Bellare, M., Ristenpart, T.: Multi-property-preserving hash domain extension and the EMD transform. In: Proceedings of ASIACRYPT 2006, vol. 4284 of Lecture Notes in Computer Science, pp. 299–314. Springer (2006)
3. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of CCS ’93p, pp. 62–73. ACM Press (1993)
4. Chang, D., Lee, S., Nandi, M., Yung, M.: Indifferentiable security analysis of popular hash functions with prefix-free padding. In: Proceedings of ASIACRYPT 2006, vol. 4284 of Lecture Notes in Computer Science, pp. 283–298. Springer (2006)
5. Chang, D., Nandi, M.: Improved Indifferentiability Security Analysis of chopMD Hash Function. In: Proc. FSE 2008, volume 5086 of Lecture Notes in Computer Science, pp. 429–443. Springer (2008)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献