Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Thomas Shrimpton
Search web for home page
Program Committees
1
2012
Crypto
pc
2
2011
Eurocrypt
pc
3
2011
PKC
pc
4
2011
Crypto
general chair
5
2010
Asiacrypt
pc
6
2009
Eurocrypt
pc
7
2008
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
Tweakable Blockciphers with Beyond Birthday-Bound Security
crypto
14-30
2
2011
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
asiacrypt
372-389
3
2011
Careful with Composition: Limitations of the Indifferentiability Framework
eurocrypt
487
4
2010
Random Oracles with(out) Programmability
asiacrypt
303-320
5
2010
An Analysis of the Blockcipher-Based Hash Functions from PGV
jofc
519-545
6
2010
Attacking the Knudsen-Preneel Compression Functions
fse
94-115
7
2009
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
jofc
311-329
8
2009
Salvaging Merkle-Damgård for Practical Applications
eurocrypt
371-388
9
2008
How to Build a Hash Function from any Collision-Resistant Function
eprint
online
10
2007
How to Build a Hash Function from Any Collision-Resistant Function
asiacrypt
147-163
11
2007
Building a Collision-Resistant Compression Function from Non-Compressing Primitives
eprint
online
12
2007
Seven-Property-Preserving Iterated Hashing: ROX
eprint
online
13
2007
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
eprint
online
14
2007
Seven-Property-Preserving Iterated Hashing: ROX
asiacrypt
130-146
15
2006
Threshold Password-Authenticated Key Exchange
jofc
27-66
16
2006
A Provable-Security Treatment of the Key-Wrap Problem
eurocrypt
online
17
2006
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem
eprint
online
18
2005
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
eurocrypt
online
19
2004
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
eprint
online
20
2004
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
fse
371-388
21
2004
A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security
eprint
online
22
2004
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
eprint
online
23
2002
Threshold Password-Authenticated Key Exchange
crypto
online
24
2002
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
eprint
online
25
2002
Encryption-Scheme Security in the Presence of Key-Dependent Messages
eprint
online
26
2002
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
crypto
online
Coauthors of Thomas Shrimpton
Elena Andreeva
John Black
Martin Cochran
Yevgeniy Dodis
Marc Fischlin
Markus Jakobsson
Will Landecker
Anja Lehmann
Philip D. MacKenzie
Gregory Neven
Onur Özen
Kenneth G. Paterson
Bart Preneel
Thomas Ristenpart
Phillip Rogaway
Hovav Shacham
Martijn Stam
R. Seth Terashima
Stefano Tessaro