Cryptology ePrint Archive: Report 2012/014
Available versions in chronological order
20120114:044730 (posted 14-Jan-2012 04:47:30 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120114:065621 (posted 14-Jan-2012 06:56:21 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120114:090022 (posted 14-Jan-2012 09:00:22 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120114:090104 (posted 14-Jan-2012 09:01:04 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120117:025735 (posted 17-Jan-2012 02:57:35 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120119:025546 (posted 19-Jan-2012 02:55:46 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120123:020629 (posted 23-Jan-2012 02:06:29 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120123:020830 (posted 23-Jan-2012 02:08:30 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120124:015029 (posted 24-Jan-2012 01:50:29 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120125:020137 (posted 25-Jan-2012 02:01:37 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120127:045418 (posted 27-Jan-2012 04:54:18 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120208:091916 (posted 08-Feb-2012 09:19:16 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120604:074913 (posted 04-Jun-2012 07:49:13 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120605:014250 (posted 05-Jun-2012 01:42:50 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120605:014319 (posted 05-Jun-2012 01:43:19 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120605:023506 (posted 05-Jun-2012 02:35:06 UTC)
On the Indifferentiable Hash Functions in the Multi-Stage Security Games
Yusuke Naito
20120611:002019 (posted 11-Jun-2012 00:20:19 UTC)
On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito
20120611:002451 (posted 11-Jun-2012 00:24:51 UTC)
On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito
20120809:073021 (posted 09-Aug-2012 07:30:21 UTC)
On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama
20120815:005816 (posted 15-Aug-2012 00:58:16 UTC)
On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama
20121025:005556 (posted 25-Oct-2012 00:55:56 UTC)
On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama
20121025:005715 (posted 25-Oct-2012 00:57:15 UTC)
On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama
20130304:002612 (posted 04-Mar-2013 00:26:12 UTC)
On Indifferentiable Hash Functions in Multi-Stage Security Games
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
20130524:014504 (posted 24-May-2013 01:45:04 UTC)
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
20130524:015920 (posted 24-May-2013 01:59:20 UTC)
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
20140604:085350 (posted 04-Jun-2014 08:53:50 UTC)
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
Original publication (with minor differences): ACNS2014
20140604:085556 (posted 04-Jun-2014 08:55:56 UTC)
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta
Original publication (with major differences): ACNS2014
[
Cryptology ePrint archive
]