From post

Improved Indifferentiability Security Analysis of chopMD Hash Function.

, и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 429-443. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Security of Hash Functions Employing Blockcipher Postprocessing., , и . IACR Cryptology ePrint Archive, (2010)Indifferentiability of the Hash Algorithm BLAKE., , и . IACR Cryptology ePrint Archive, (2011)A Generalized Format Preserving Encryption Framework Using MDS Matrices., , , , и . J. Hardw. Syst. Secur., 3 (1): 3-11 (2019)Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher., и . IACR Cryptol. ePrint Arch., (2023)Generation of Secure and Reliable Honeywords, Preventing False Detection., , , , и . IEEE Trans. Dependable Secur. Comput., 16 (5): 757-769 (2019)FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm., , , , и . Digit. Investig., (2022)Cryptanalytic time-memory trade-off for password hashing schemes., , , и . Int. J. Inf. Sec., 18 (2): 163-180 (2019)Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)., , и . Int. J. Appl. Cryptogr., 3 (3): 262-287 (2017)Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme.. INDOCRYPT, том 7668 из Lecture Notes in Computer Science, стр. 545-563. Springer, (2012)Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain., , и . IACR Cryptology ePrint Archive, (2019)