Cryptology ePrint Archive: Report 2008/379

Available versions in chronological order


Hash Functions from Sigma Protocols and Improvements to VSH
Mihir Bellare and Todor Ristov
Publication Info: Preliminary version in Asiacrypt 2008. This is the full version.

Hash Functions from Sigma Protocols and Improvements to VSH
Mihir Bellare and Todor Ristov
Publication Info: Preliminary version in Asiacrypt 2008. This is the full version.

Hash Functions from Sigma Protocols and Improvements to VSH
Mihir Bellare and Todor Ristov
Publication Info: Preliminary version in Asiacrypt 2008. This is the full version.

A Characterization of Chameleon Hash Functions and New, Efficient Designs
Mihir Bellare and Todor Ristov
Publication Info: Preliminary version appeared in ASIACRYPT 2008 entitled ``Hash functions from Sigma protocols and improvements to VSH." This is the full version.

A Characterization of Chameleon Hash Functions and New, Efficient Designs
Mihir Bellare and Todor Ristov
Publication Info: Preliminary version appeared in ASIACRYPT 2008 entitled ``Hash functions from Sigma protocols and improvements to VSH." This is the full version.

A Characterization of Chameleon Hash Functions and New, Efficient Designs
Mihir Bellare and Todor Ristov
Publication Info: Preliminary version appeared in ASIACRYPT 2008 entitled ``Hash functions from Sigma protocols and improvements to VSH." This is the full version.


[ Cryptology ePrint archive ]