Linked e-resources
Details
Table of Contents
Introduction
Preliminaries: Cryptographic Foundations
Part I: Foundations
Computational Security
Pseudorandomness and Computational Indistinguishability
Collision Resistance
Encryption Schemes
Signature Schemes
Non-cryptographic Hashing
Part II: The Random Oracle Methodology
The Random Oracle Model
The Full Power of Random Oracles
Random Oracle Schemes in Practice
Limitations of Random Oracles
The Random Oracle Controversy
Part III: Hash Function Constructions
Iterated Hash Functions
Constructing Compression Functions
Iterated Hash Functions in Practice
Constructions of Keyed Hash Functions
Constructing Random Oracles: Indifferentiability
Constructing Random Oracles: UCEs
Index.
Preliminaries: Cryptographic Foundations
Part I: Foundations
Computational Security
Pseudorandomness and Computational Indistinguishability
Collision Resistance
Encryption Schemes
Signature Schemes
Non-cryptographic Hashing
Part II: The Random Oracle Methodology
The Random Oracle Model
The Full Power of Random Oracles
Random Oracle Schemes in Practice
Limitations of Random Oracles
The Random Oracle Controversy
Part III: Hash Function Constructions
Iterated Hash Functions
Constructing Compression Functions
Iterated Hash Functions in Practice
Constructions of Keyed Hash Functions
Constructing Random Oracles: Indifferentiability
Constructing Random Oracles: UCEs
Index.