Sciweavers

5722 search results - page 18 / 1145
» Security Function Interactions
Sort
View
CCS
2009
ACM
14 years 18 days ago
Efficient pseudorandom functions from the decisional linear assumption and weaker variants
In this paper, we generalize Naor and Reingold's construction of pseudorandom functions under the DDH Assumption to yield a construction of pseudorandom
Allison B. Lewko, Brent Waters
JUCS
2008
144views more  JUCS 2008»
13 years 8 months ago
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Abstract: Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial
Christian Rechberger, Vincent Rijmen
ACISP
2011
Springer
13 years 7 days ago
Cryptanalysis of the Compression Function of SIMD
Abstract. SIMD is one of the second round candidates of the SHA3 competition hosted by NIST. In this paper, we present some results
Hongbo Yu, Xiaoyun Wang
ISW
2004
Springer
14 years 2 months ago
How to Break and Repair a Universally Composable Signature Functionality
Abstract. Canetti and Rabin recently proposed a universally composable ideal functionality FSIG for digital signatures. We show that this functionality cannot be securely realized ...
Michael Backes, Dennis Hofheinz