Cryptology ePrint Archive: Report 2012/014

Available versions in chronological order


On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito

On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito

On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito

On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama

On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama

On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama

On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama

On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta

Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta

Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta


[ Cryptology ePrint archive ]