Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Linked e-resources
Details
Table of Contents
Introduction
Preliminaries: Cryptographic Foundations
Part I: Foundations
Computational Security
Pseudorandomness and Computational Indistinguishability
Collision Resistance
Encryption Schemes
Signature Schemes
Non-cryptographic Hashing
Part II: The Random Oracle Methodology
The Random Oracle Model
The Full Power of Random Oracles
Random Oracle Schemes in Practice
Limitations of Random Oracles
The Random Oracle Controversy
Part III: Hash Function Constructions
Iterated Hash Functions
Constructing Compression Functions
Iterated Hash Functions in Practice
Constructions of Keyed Hash Functions
Constructing Random Oracles: Indifferentiability
Constructing Random Oracles: UCEs
Index.
Preliminaries: Cryptographic Foundations
Part I: Foundations
Computational Security
Pseudorandomness and Computational Indistinguishability
Collision Resistance
Encryption Schemes
Signature Schemes
Non-cryptographic Hashing
Part II: The Random Oracle Methodology
The Random Oracle Model
The Full Power of Random Oracles
Random Oracle Schemes in Practice
Limitations of Random Oracles
The Random Oracle Controversy
Part III: Hash Function Constructions
Iterated Hash Functions
Constructing Compression Functions
Iterated Hash Functions in Practice
Constructions of Keyed Hash Functions
Constructing Random Oracles: Indifferentiability
Constructing Random Oracles: UCEs
Index.