111![Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 3 Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 3](https://www.pdfsearch.io/img/750b05babc850f9b9f3997a1f8aab823.jpg) | Add to Reading ListSource URL: www.isical.ac.inLanguage: English - Date: 2011-12-28 03:46:39
|
---|
112![A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model Wonil Lee1 , Mridul Nandi2 , Palash Sarkar2 , Donghoon Chang1 , Sangjin Lee1 , and Kouichi Sakurai3 1 A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model Wonil Lee1 , Mridul Nandi2 , Palash Sarkar2 , Donghoon Chang1 , Sangjin Lee1 , and Kouichi Sakurai3 1](https://www.pdfsearch.io/img/5def60f1af2456756ffa6202f8c71476.jpg) | Add to Reading ListSource URL: www.isical.ac.inLanguage: English - Date: 2011-12-28 03:46:39
|
---|
113![. . Security Reductions of Cryptographic Hash Functions . . . Security Reductions of Cryptographic Hash Functions .](https://www.pdfsearch.io/img/c1edeecc10597cac40d8952de33aa121.jpg) | Add to Reading ListSource URL: www1.spms.ntu.edu.sgLanguage: English - Date: 2011-08-31 02:03:42
|
---|
114![Towards Optimal Double-Length Hash Functions Mridul Nandi Applied Statistics Unit Indian Statistical Institute Kolkata, India mridul Towards Optimal Double-Length Hash Functions Mridul Nandi Applied Statistics Unit Indian Statistical Institute Kolkata, India mridul](https://www.pdfsearch.io/img/355d789e8c03108ceb9d99e5280ff6de.jpg) | Add to Reading ListSource URL: www.isical.ac.inLanguage: English - Date: 2011-12-28 03:46:39
|
---|
115![Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep](https://www.pdfsearch.io/img/24f2e8a015c864fc31222559e0cd2132.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2008-09-27 14:59:29
|
---|
116![FSE17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose FSE17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose](https://www.pdfsearch.io/img/955356442ea14c18eb6770a07e56011a.jpg) | Add to Reading ListSource URL: fse2006.iaik.tugraz.atLanguage: English - Date: 2013-02-04 08:11:49
|
---|
117![Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions Rishiraj Bhattacharyya1 , Avradip Mandal2 , and Mridul Nandi3 1 Applied Statistics Unit, Indian Statistical Institut Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions Rishiraj Bhattacharyya1 , Avradip Mandal2 , and Mridul Nandi3 1 Applied Statistics Unit, Indian Statistical Institut](https://www.pdfsearch.io/img/339f56cbc55a67d6617f5e30527d8739.jpg) | Add to Reading ListSource URL: www.isical.ac.inLanguage: English - Date: 2011-12-28 03:46:39
|
---|
118![Characterization of Padding Rules and Different Variants of MD Hash Functions Mridul Nandi National Institute of Standards and Technology Characterization of Padding Rules and Different Variants of MD Hash Functions Mridul Nandi National Institute of Standards and Technology](https://www.pdfsearch.io/img/e6ed15f045c69ade67e16d85aa2188d6.jpg) | Add to Reading ListSource URL: www.isical.ac.inLanguage: English - Date: 2011-12-28 03:46:39
|
---|
119![Data Discovery and Dissemination with DIP tinyos-2.x/tos/lib/net/dip Kaisen Lin UC San Diego Data Discovery and Dissemination with DIP tinyos-2.x/tos/lib/net/dip Kaisen Lin UC San Diego](https://www.pdfsearch.io/img/e2d23b987acd87b28a433d9ac7b17cac.jpg) | Add to Reading ListSource URL: sing.stanford.eduLanguage: English - Date: 2014-11-10 18:30:10
|
---|
120![Introduction Early Applications to Block Ciphers Preimages of Hash Functions Introduction Early Applications to Block Ciphers Preimages of Hash Functions](https://www.pdfsearch.io/img/a5ec074adaa290a34288c4982489a679.jpg) | Add to Reading ListSource URL: web.spms.ntu.edu.sgLanguage: English - Date: 2012-08-26 19:26:44
|
---|