Author of the publication

A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model.

, , , , , and . IACR Cryptol. ePrint Arch., (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterization of EME with Linear Mixing., and . IWSEC, volume 8639 of Lecture Notes in Computer Science, page 221-239. Springer, (2014)On the Security of Hash Functions Employing Blockcipher Postprocessing., , and . FSE, volume 6733 of Lecture Notes in Computer Science, page 146-166. Springer, (2011)Fault Based Almost Universal Forgeries on CLOC and SILC., , , , , and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 66-86. Springer, (2016)PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 39-48 (2005)Blockcipher-Based Authenticated Encryption: How Small Can We Go?, , , and . J. Cryptol., 33 (3): 703-741 (2020)Subversion Resilient Hashing: Efficient Constructions and Modular Proofs for Crooked Indifferentiability., , and . IEEE Trans. Inf. Theory, 69 (5): 3302-3315 (May 2023)BBB Secure Nonce Based MAC Using Public Permutations., and . IACR Cryptol. ePrint Arch., (2020)Delegation-based conversion from CPA to CCA-secure predicate encryption., and . Int. J. Appl. Cryptogr., 4 (1): 16-35 (2020)From Combined to Hybrid: Making Feedback-based AE even Smaller., , , , and . IACR Trans. Symmetric Cryptol., 2020 (S1): 417-445 (2020)sfDWCDM+: A BBB secure nonce based MAC., , , and . Adv. Math. Commun., 13 (4): 705-732 (2019)