Skip to main content

Page of 2 next disabled
and
  1. Chapter and Conference Paper

    Format-Preserving Encryption

    Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a valid credit-card number. The pr...

    Mihir Bellare, Thomas Ristenpart, Phillip Rogaway in Selected Areas in Cryptography (2009)

  2. Chapter and Conference Paper

    Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles

    We strengthen the foundations of deterministic public-key encryption via definitional equivalences and standard-model constructs based on general assumptions. Specifically we consider seven notions of privacy ...

    Mihir Bellare, Marc Fischlin, Adam O’Neill in Advances in Cryptology – CRYPTO 2008 (2008)

  3. Chapter and Conference Paper

    How to Build a Hash Function from Any Collision-Resistant Function

    Recent collision-finding attacks against hash functions such as MD5 and SHA-1 motivate the use of provably collision-resistant (CR) functions in their place. Finding a collision in a provably CR function implies ...

    Thomas Ristenpart, Thomas Shrimpton in Advances in Cryptology – ASIACRYPT 2007 (2007)

  4. Chapter and Conference Paper

    The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks

    Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been establishe...

    Thomas Ristenpart, Scott Yilek in Advances in Cryptology - EUROCRYPT 2007 (2007)

  5. Chapter and Conference Paper

    Multi-Property-Preserving Hash Domain Extension and the EMD Transform

    We point out that the seemingly strong pseudorandom oracle preserving (PRO-Pr) property of hash function domain-extension transforms defined and implemented by Coron et. al. [1] can actually weaken our guarantees...

    Mihir Bellare, Thomas Ristenpart in Advances in Cryptology – ASIACRYPT 2006 (2006)

Page of 2 next disabled