In this thesis we study how hash chains and other hash structures can be used in various cryptographic applications. In particular we focus on the applications of entity authentication, signatures and key establishment. We study recursive application of hash functions to create hash chains, hash trees and other hash structures. We collate all these to form a catalogue of structures that we apply to various cryptographic applications. We study existing work on authentication and create many entity authentication schemes based on structures from our catalogue. We present a novel algorithm to find efficient signature schemes from any given hash structure. We study some suggestions for suitable hash structures and define a particular scalabl...
This thesis surveys the current state of the art of hash-based cryptography with a view to finding v...
Driven by the open problem raised by Hofheinz and Kiltz (Journal of Cryptology, 2012), we study the ...
Het onderwerp van deze thesis is het onderzoek naar domeinuitbreidingen voor cryptografische hashfun...
In this thesis we study how hash chains and other hash structures can be used in various cryptograph...
This thesis is concerned with giving both an overview of the application of hash functions in crypto...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Collision resistant one-way hashing schemes are the basic building blocks of almost all crypto-syste...
A hash function maps a variable length input into a fixed length output. The hash functions that are...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
In this thesis we study the security of a number of dedicated cryptographic hash functions against c...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
The paper presents a theoretical introduction to the cryptographic hash function theory and a statis...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
In large-scale distributed systems, where adversarial attacks can have widespread impact, authentica...
This thesis surveys the current state of the art of hash-based cryptography with a view to finding v...
Driven by the open problem raised by Hofheinz and Kiltz (Journal of Cryptology, 2012), we study the ...
Het onderwerp van deze thesis is het onderzoek naar domeinuitbreidingen voor cryptografische hashfun...
In this thesis we study how hash chains and other hash structures can be used in various cryptograph...
This thesis is concerned with giving both an overview of the application of hash functions in crypto...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Collision resistant one-way hashing schemes are the basic building blocks of almost all crypto-syste...
A hash function maps a variable length input into a fixed length output. The hash functions that are...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
In this thesis we study the security of a number of dedicated cryptographic hash functions against c...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
The paper presents a theoretical introduction to the cryptographic hash function theory and a statis...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
The sequential computation of hashes at the core of many distributed storage systems and found, for ...
In large-scale distributed systems, where adversarial attacks can have widespread impact, authentica...
This thesis surveys the current state of the art of hash-based cryptography with a view to finding v...
Driven by the open problem raised by Hofheinz and Kiltz (Journal of Cryptology, 2012), we study the ...
Het onderwerp van deze thesis is het onderzoek naar domeinuitbreidingen voor cryptografische hashfun...