Käesolevas töös uurime piiranguteta ajatempliskeemi jaoks turvaliste räsifunktsioonide konstrueerimise võimalusi kollisioonivabadest räsifunktsioonidest. Kasutades Harberi ja Stornetta poolt loodud ajatembeldusskeemi ning Buldase ja Saarepera poolt selle jaoks konstrueeritud turvatingimust uurime nn. musta kasti konstruktsioonide võimatuse tõestuse võimalikkust. Kuna võimatuse tõestuse lihtsaim variant on oraakliga eraldus, keskendumegi just ühe selle eralduse jaoks sobivana tunduva oraakli omaduste ja võimaluste uurimisele. Me eeldame, et oraakel konstrueerib räsipuu, väljastab puu juurväärtuse ning annab seejärel sellest puust lähtuvalt ajatemplisertifikaate. Me tõestame, et kui oraakli argumendiks olev musta kasti meetodil koostatud räs...
© 1993, Springer Verlag. All rights reserved. At Crypto '89 Ivan Damgård [1] presented a method that...
Time-lock puzzles are a mechanism for sending messages to the future , by allowing a sender to quic...
This thesis is concerned with giving both an overview of the application of hash functions in crypto...
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the ...
Abstract. We study the influence of collision-finding attacks on the security of time-stamping schem...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
In this paper, we present a construction of hash functions. These functions are collision free in th...
Abstract. We present a new tighter security proof for unbounded hash tree keyless signature (time-st...
Abstract. There is a foundational problem involving collision-resistant hash-functions: common const...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
Chameleon-hashes are collision-resistant hash-functions parametrized by a public key. If the corresp...
www.cryptoplexity.de arno.mittelbach @ cased.de Abstract. A combiner for collision-resistant hash fu...
International audienceTime-stamping is a technique used to prove the existence of a digital document...
To establish that a document was created after a given moment in time, it is necessary to report eve...
Doctor en Ciencias, Mención ComputaciónSe estudian funciones de hash resistentes a colisiones (FHRC)...
© 1993, Springer Verlag. All rights reserved. At Crypto '89 Ivan Damgård [1] presented a method that...
Time-lock puzzles are a mechanism for sending messages to the future , by allowing a sender to quic...
This thesis is concerned with giving both an overview of the application of hash functions in crypto...
Abstract. It is almost a folklore-knowledge that hash-based time-stamping schemes are secure if the ...
Abstract. We study the influence of collision-finding attacks on the security of time-stamping schem...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
In this paper, we present a construction of hash functions. These functions are collision free in th...
Abstract. We present a new tighter security proof for unbounded hash tree keyless signature (time-st...
Abstract. There is a foundational problem involving collision-resistant hash-functions: common const...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
Chameleon-hashes are collision-resistant hash-functions parametrized by a public key. If the corresp...
www.cryptoplexity.de arno.mittelbach @ cased.de Abstract. A combiner for collision-resistant hash fu...
International audienceTime-stamping is a technique used to prove the existence of a digital document...
To establish that a document was created after a given moment in time, it is necessary to report eve...
Doctor en Ciencias, Mención ComputaciónSe estudian funciones de hash resistentes a colisiones (FHRC)...
© 1993, Springer Verlag. All rights reserved. At Crypto '89 Ivan Damgård [1] presented a method that...
Time-lock puzzles are a mechanism for sending messages to the future , by allowing a sender to quic...
This thesis is concerned with giving both an overview of the application of hash functions in crypto...