One-way function

Results: 187



#Item
91Merkle–Damgård construction / Birthday attack / Hash function / One-way compression function / Preimage attack / Cryptography / Cryptographic hash functions / Message authentication codes

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
92Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
93RSA / One-way function / Cryptography / Public-key cryptography / Broadcast encryption

Efficient Broadcast Encryption Scheme with Log-Key Storage† Yong Ho Hwang and Pil Joong Lee Dept. of Electronic and Electrical Eng., POSTECH, Korea. [removed],[removed] Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-16 22:19:27
94Pseudorandomness / Computability theory / Computational complexity theory / Combinatorics / Cryptography / One-way function / Pseudorandom generator / Oracle machine / Permutation / Mathematics / Theoretical computer science / Applied mathematics

On Hardness Amplification of One-Way Functions Henry Lin? , Luca Trevisan?? , and Hoeteck Wee? ? ? Computer Science Division UC Berkeley

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
95Cryptography / Function / Pseudorandom function family / Polynomial / One-way function / Probably approximately correct learning / Mathematics / Applied mathematics / Pseudorandomness

Aggregate Pseudorandom Functions and Connections to Learning Aloni Cohen∗ Shafi Goldwasser†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-19 04:22:49
96Hash function / Collision attack / Birthday attack / Collision / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Preimage attack

Multicollision Attacks on Some Generalized Sequential Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:57:26
97Universal one-way hash function / SHA-1 / SHA-2 / Hash function / Hash list / Cryptographic primitive / Collision / MD5 / One-way function / Cryptographic hash functions / Error detection and correction / Cryptography

1 Q2S Edon-R, An Infinite Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:38:20
98Hashing / Message authentication codes / Padding / Hash function / MD5 / One-way compression function / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic Hash Workshop[removed]Enhancing the MD-Strengthening & Designing Scalable 1-Way Hash Families

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:30:02
99Error detection and correction / Search algorithms / Hash function / Merkle–Damgård construction / Preimage attack / Hash list / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
100Cryptography / Collision resistance / Hash function / Hash list / SHA-2 / Collision / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Hashing

Classification of Hash Functions Suitable for Real-life Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:53:32
UPDATE