Back to Results
First PageMeta Content
Computational complexity theory / Preimage attack / Basketball at the 2009 Summer Universiade / Cryptographic hash functions


On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang1 , Mridul Nandi2 , and Moti Yung3 1 3
Add to Reading List

Document Date: 2010-12-10 07:46:56


Open Document

File Size: 354,97 KB

Share Result on Facebook

City

Hyderabad / /

Company

Google Inc. / /

Country

United States / India / /

Currency

pence / /

/

Facility

National Institute of Standards and Technology / C R Rao AIMSCS Institute / Columbia University / /

IndustryTerm

above post-processors / double block length post processors / hash algorithm / probabilistic oracle algorithm / post processors / post-processor / /

Organization

National Institute of Standards and Technology / Department of Computer Science / Rao AIMSCS Institute / Columbia University / New York / /

Person

Ecomp / /

Position

extractor / multi-point extractor / given PrA-extractor / PrA extractor / computable message extractor / /

Product

Lemma 3.3 / Lemma 3.4 / Lemma 3 / /

ProgrammingLanguage

R / C / /

ProvinceOrState

California / /

Technology

Davis-Meyer post-processor / cryptography / probabilistic oracle algorithm / above post-processors / Skein hash algorithm / double block length post processors / simulation / DBL post processors / /

SocialTag