Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
27
views
19
references
Top references
cited by
14
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,163
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – ASIACRYPT 2006
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
other
Author(s):
Mihir Bellare
,
Thomas Ristenpart
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Murmann Publishers
Most cited references
19
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Random oracles are practical
Mihir Bellare
,
Phillip Rogaway
(1993)
0
comments
Cited
163
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Optimal asymmetric encryption
Mihir Bellare
,
Phillip Rogaway
(1995)
0
comments
Cited
114
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
The random oracle methodology, revisited
Ran Canetti
,
Shai Halevi
,
Oded Goldreich
(2004)
0
comments
Cited
82
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 299-314
DOI:
10.1007/11935230_20
SO-VID:
afa4784e-12f5-4f85-b375-9aef526e9cee
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 194
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator
pp. 37
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
pp. 84
Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity
pp. 161
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
pp. 178
On the Generic Construction of Identity-Based Signatures with Additional Properties
pp. 299
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
pp. 444
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Similar content
1,163
UMD-EMD Database
Authors:
Hardware Implementation of EMD Using DSP and FPGA for Online Signal Processing
Authors:
Ming-Huan Lee
,
Kuo-Kai Shyu
,
Po-Lei Lee
…
Monitoring of 304 austenitic stainless-steel laser-MIG hybrid welding process based on EMD-SVM
Authors:
Xi'an Fan
,
Xiangdong Gao
,
Nanfeng Zhang
…
See all similar
Cited by
14
On the Indifferentiability of the Sponge Construction
Authors:
Guido Bertoni
,
Joan Daemen
,
Michael Peeters
…
Careful with Composition: Limitations of the Indifferentiability Framework
Authors:
Thomas Ristenpart
,
Hovav Shacham
,
Thomas Shrimpton
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Authors:
Mihir Bellare
,
Thomas Ristenpart
See all cited by