Affiliation:
1. Department of Computational Science and Engineering, Nagoya University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference20 articles.
1. [1] J.H. An and M. Bellare, “Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions, ” CRYPTO'99, LNCS 1666, ed. M. Wiener, Springer-Verlag, 1999.
2. [2] E. Andreeva and B. Preneel, “A three-property-preserving hash function, ” SAC 2008, LNCS 5381, pp.228-244, Springer-Verlag, 2009.
3. [3] E. Andreeva, G. Neven, B. Preneel, and T. Shrimpton, “Seven-property-preserving iterated hashing: ROX, ” ASIACRYPT 2007, LNCS 4833, pp.130-146, ed. K. Kurosawa, Springer-Verlag, 2007.
4. [4] M. Bellare and T. Ristenpart, “Multi-property-preserving hash domain extension and the EMD transform, ” ASIACRYPT 2006, LNCS 4284, pp.299-314, Springer-Verlag, 2006.
5. [5] M. Bellare and T. Ristenpart, “Hash functions in the dedicated-key setting: Design choices and MPP transforms, ” ICALP 2007, LNCS 4596, pp.399-410, Springer-Verlag, 2007.