Cryptology ePrint Archive: Report 2014/393

Available versions in chronological order


(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng

(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng

(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng

(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng

(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng

(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng

(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng

(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng

(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng

(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond
Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng
Original publication (with major differences): IACR-CRYPTO-2015


[ Cryptology ePrint archive ]