Sciweavers

75 search results - page 13 / 15
» The Hash Function Family LAKE
Sort
View
CCR
2004
113views more  CCR 2004»
13 years 7 months ago
Implementing aggregation and broadcast over Distributed Hash Tables
Peer-to-peer (P2P) networks represent an effective way to share information, since there are no central points of failure or bottleneck. However, the flip side to the distributive...
Ji Li, Karen R. Sollins, Dah-Yoh Lim
CRYPTO
2001
Springer
117views Cryptology» more  CRYPTO 2001»
14 years 3 days ago
Online Ciphers and the Hash-CBC Construction
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having p...
Mihir Bellare, Alexandra Boldyreva, Lars R. Knudse...
CCS
2008
ACM
13 years 9 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
EUROCRYPT
2006
Springer
13 years 11 months ago
Optimal Reductions Between Oblivious Transfers Using Interactive Hashing
Abstract. We present an asymptotically optimal reduction of one-outof-two String Oblivious Transfer to one-out-of-two Bit Oblivious Transfer using Interactive Hashing in conjunctio...
Claude Crépeau, George Savvides
ACISP
2007
Springer
13 years 11 months ago
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
We study the multicast stream authentication problem when the communication channel is under control of an opponent who can drop, reorder and inject data packets. In this work, we...
Christophe Tartary, Huaxiong Wang