1![This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn](https://www.pdfsearch.io/img/76afff3c0127a6c1d6e470fe7527107b.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2015-02-21 09:51:42
|
---|
2![Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two](https://www.pdfsearch.io/img/8894e1130bfb81d618317283d53942e7.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-06-28 21:51:08
|
---|
3![Introduction MD New Results I Introduction MD New Results I](https://www.pdfsearch.io/img/6e47612451454cc2c554df135718885e.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2008-09-27 14:59:29
|
---|
4![How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta](https://www.pdfsearch.io/img/6543e8126df128b796fb46333fd7616c.jpg) | Add to Reading ListSource URL: www.anf.esLanguage: English - Date: 2014-05-12 07:16:17
|
---|
5![Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number G Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number G](https://www.pdfsearch.io/img/0058672054040c86c3045ea6c3d3c96e.jpg) | Add to Reading ListSource URL: www.di.ens.frLanguage: English - Date: 2002-06-27 15:00:00
|
---|
6![An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing: An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:](https://www.pdfsearch.io/img/3de78805a464d5d2e97246ae85e92c9a.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 1998-07-30 12:00:14
|
---|
7![Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012 Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012](https://www.pdfsearch.io/img/9e5cb2d25c5cf3d1aa106c96ae03a351.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2012-04-20 07:04:20
|
---|
8![1 Q2S Edon-R, An Infinite Family of Cryptographic Hash Functions 1 Q2S Edon-R, An Infinite Family of Cryptographic Hash Functions](https://www.pdfsearch.io/img/e382b2b72926be0d9d00e5a661bdd864.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 08:38:20
|
---|
9![Classification of Hash Functions Suitable for Real-life Systems Classification of Hash Functions Suitable for Real-life Systems](https://www.pdfsearch.io/img/8fbb8a175061f2380f3222eecae885c2.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 09:53:32
|
---|
10![Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper](https://www.pdfsearch.io/img/d25ca4a4ad8e8cc508dcc67b28b6e4af.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 09:54:18
|
---|