Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
40
views
29
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,505
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – ASIACRYPT 2007
Seven-Property-Preserving Iterated Hashing: ROX
other
Author(s):
Elena Andreeva
,
Gregory Neven
,
Bart Preneel
,
Thomas Shrimpton
Publication date
(Print):
2007
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
29
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Random oracles are practical
Mihir Bellare
,
Phillip Rogaway
(1993)
0
comments
Cited
163
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Certified Digital Signature
Ralph C. Merkle
(1990)
0
comments
Cited
89
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Design Principle for Hash Functions
Ivan Damgard
(1990)
0
comments
Cited
72
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Pages
: 130-146
DOI:
10.1007/978-3-540-76900-2_8
SO-VID:
b792e7aa-9b6c-4ed1-88c5-1ad938aba37c
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
A Kilobit Special Number Field Sieve Factorization
pp. 410
Information-Theoretic Security Without an Honest Majority
pp. 29
Faster Addition and Doubling on Elliptic Curves
pp. 68
On Privacy Models for RFID
pp. 130
Seven-Property-Preserving Iterated Hashing: ROX
pp. 164
Fully Anonymous Group Signatures Without Random Oracles
pp. 200
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
pp. 265
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
pp. 315
Known-Key Distinguishers for Some Block Ciphers
pp. 342
On Tweaking Luby-Rackoff Blockciphers
pp. 502
Bounded CCA2-Secure Encryption
Similar content
3,505
[ROX index, high-flow oxygen therapy and COVID-19 pneumonia]
Authors:
I. ROMERO
,
E Cornu
,
F Palizas
…
ROX index to predict CPAP outcome in hypoxemic respiratory failure due to COVID-19
Authors:
Nicolas Colaianni-Alfonso
,
Guillermo Cesar Montiel
,
Mauro Castro-Sayat
…
Bio-Rad iTaq Supermix with ROX
Authors:
See all similar
Cited by
6
On the Indifferentiability of the Sponge Construction
Authors:
Guido Bertoni
,
Joan Daemen
,
Michael Peeters
…
The Hash Function Family LAKE
Authors:
Jean-Philippe Aumasson
,
Willi Meier
,
Raphael C. -W. Phan
A Three-Property-Secure Hash Function
Authors:
Elena I. Andreeva
,
Bart Preneel
See all cited by