2008
DOI: 10.4314/jonamp.v11i1.40244
|View full text |Cite
|
Sign up to set email alerts
|

Incremental cryptography and security of public hash functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…This demands not only that we avoid asymptotic and address security exactly, but also that we strive for security reductions which are as efficient as possible. 2 Thus the theorem proving the security of our basic scheme, as in [12], quantifies the resources and success probability of a potential adversary let her run for time …”
Section: Assessment Of the 'Exact Security' Of Our Schemementioning
confidence: 99%
“…This demands not only that we avoid asymptotic and address security exactly, but also that we strive for security reductions which are as efficient as possible. 2 Thus the theorem proving the security of our basic scheme, as in [12], quantifies the resources and success probability of a potential adversary let her run for time …”
Section: Assessment Of the 'Exact Security' Of Our Schemementioning
confidence: 99%
“…The philosophy behind a universal one-way hash function (UOWHF) is that if, first the input is selected and subsequently the hash function, it does not help an opponent to find collisions for the hash function [1]. Collisions are only useful if first the function is fixed and subsequently one can search for two colliding inputs.…”
Section: Introductionmentioning
confidence: 99%