Random oracle

Results: 199



#Item
171Feistel cipher / Block cipher / Pseudorandom permutation / Oracle machine / Random oracle / Permutation / Oracle Corporation / Slide attack / ICE / Cryptography / Cryptographic hash functions / Advantage

Eliminating Random Permutation Oracles in the Even-Mansour Cipher Craig Gentry and Zulfikar Ramzan

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
172One-way compression function / Merkle–Damgård construction / Random oracle / Universal one-way hash function / Collision resistance / Hash function / Collision / Birthday attack / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
173Electronic commerce / RSA / Digital signature / Random oracle / Provably secure cryptographic hash function / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic hash functions

ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-07-13 05:54:26
174Probabilistic encryption / Probability theory / Random oracle / RSA / Advantage / Chosen-ciphertext attack / Cipher / Digital signature / Key size / Cryptography / Public-key cryptography / Key management

A “proof-reading” of some issues in cryptography Ivan Damg˚

Add to Reading List

Source URL: www.daimi.au.dk

Language: English - Date: 2007-10-01 04:24:00
175Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / IEEE P1363 / RSA / Key encapsulation / Integrated Encryption Scheme / Chosen-ciphertext attack / Block cipher modes of operation / Random oracle / Cryptography / Cryptography standards / Public-key cryptography

A Proposal for an ISO Standard for Public Key Encryption (version 2.1) Victor Shoup

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-12-20 09:19:49
176Search algorithms / Error detection and correction / Pseudorandom function family / Hash function / Random oracle / Optimal asymmetric encryption padding / Feistel cipher / Collision resistance / Advantage / Cryptography / Cryptographic hash functions / Hashing

A preliminary version appears at ICALP, Lecture Notes in Computer Science, Springer-Verlag, [removed]Robust Multi-Property

Add to Reading List

Source URL: homepages.cwi.nl

Language: English - Date: 2008-08-14 09:00:13
177Electronic commerce / Key management / RSA / Integer factorization / Digital signature / Key size / Strong RSA assumption / Elliptic curve cryptography / Random oracle / Cryptography / Public-key cryptography / Computational hardness assumptions

Evaluation of Security Level of Cryptography: ACE Signature Scheme Alfred Menezes, Minghua Qu, Doug Stinson, Yongge Wang

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
178Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
179Random oracle / Advantage / Padding / Stream cipher / Collision resistance / Hash function / Keccak / One-way compression function / Cryptography / Cryptographic hash functions / Block cipher

Cryptographic sponge functions Guido B

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
180Mathematical analysis / SWIFFT / Fast Fourier transform / Universal hashing / Fourier transform / SHA-2 / Vector space / Random oracle / Hash function / Cryptographic hash functions / Mathematics / Algebra

SWIFFT: A Modest Proposal for FFT Hashing Vadim Lyubashevsky1 , Daniele Micciancio1 , Chris Peikert2, , and Alon Rosen3 1

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2009-08-17 12:04:34
UPDATE