Amanote Research

Amanote Research

    RegisterSign In

Building Provably Secure Block Ciphers From Cryptographic Hash Functions

International Journal of Computer Applications
doi 10.5120/ijca2020920123
Full Text
Open PDF
Abstract

Available in full text

Date

April 15, 2020

Authors
Charles F.
Publisher

Foundation of Computer Science


Related search

Provably Secure Cryptographic Constructions

2012English

Hash Functions and MAC Algorithms Based on Block Ciphers

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1997English

Cryptographic Hash Functions

2010English

On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses

English

Tightly-Secure Signatures From Chameleon Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Javascript Security Using Cryptographic Hash Functions

Advanced Information Systems
2019English

The State of Cryptographic Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

Theoretical and Experimental Analysis of Cryptographic Hash Functions

Journal of Telecommunications and Information Technology
Electronic EngineeringCommunicationsElectricalComputer Networks
2019English

A Provably Secure Distant Data Integrity Checking With Homomorphic Hash Function in Secure Cloud Storage

International Journal of Innovative Technology and Exploring Engineering
Mechanics of MaterialsElectronic EngineeringCivilStructural EngineeringElectricalComputer Science
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy