Random oracle

Results: 199



#Item
121Search algorithms / Error detection and correction / Hash function / Random oracle / Oracle machine / Preimage attack / Elliptic curve only hash / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:10:52
122Random oracle / HMAC / Collision resistance / Optimal asymmetric encryption padding / Hash function / Preimage attack / Collision / Ciphertext indistinguishability / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:02:04
123Error detection and correction / Search algorithms / Random oracle / Hash tree / Hash function / Hash chain / Oracle machine / Hash list / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present security proofs for the BLT signature scheme in the mode

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-04 03:31:48
124CRYPTREC / Collision resistance / Random oracle / Preimage attack / HMAC / Hash function / Crypt / Outline of cryptography / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:08:26
125Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:33
126Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:36
127Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction

Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:54:18
128Merkle–Damgård construction / Probability theory / Random oracle / Hash function / HMAC / Oracle machine / Collision resistance / Random function / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

Merkle Damgard Revisited: how to Construct a hash Function Jean-Sebastien Coron Yevgeniy Dodis Cecile Malinaud

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
129Merkle–Damgård construction / Random oracle / Optimal asymmetric encryption padding / Oracle machine / SWIFFT / Cryptography / Cryptographic hash functions / Advantage

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:58:50
130Search algorithms / Error detection and correction / Birthday attack / Hash function / Random oracle / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

2nd Cryptographic Hash Workshop[removed], Santa Barbara, California) How to Construct Double-Block-Length Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:51:10
UPDATE