Merkle-Damgård Revisited: How to Construct a Hash Function
Top Cited Papers
- 1 January 2005
- book chapter
- Published by Springer Nature
- p. 430-448
- https://doi.org/10.1007/11535218_26
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption ProblemPublished by Springer Nature ,2004
- On the Random-Oracle Methodology as Applied to Length-Restricted Signature SchemesPublished by Springer Nature ,2004
- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGVPublished by Springer Nature ,2002
- The Security of Cipher Block ChainingPublished by Springer Nature ,2001
- A Design Principle for Hash FunctionsPublished by Springer Nature ,2001
- Universally composable security: a new paradigm for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened AssumptionsPublished by Springer Nature ,1999
- Collision-Resistant hashing: Towards making UOWHFs practicalPublished by Springer Nature ,1997
- The Exact Security of Digital Signatures-How to Sign with RSA and RabinPublished by Springer Nature ,1996
- Optimal asymmetric encryptionPublished by Springer Nature ,1995