2008 |
7 | EE | Elena Andreeva,
Charles Bouillaguet,
Pierre-Alain Fouque,
Jonathan J. Hoch,
John Kelsey,
Adi Shamir,
Sébastien Zimmer:
Second Preimage Attacks on Dithered Hash Functions.
EUROCRYPT 2008: 270-288 |
6 | EE | Jonathan J. Hoch,
Adi Shamir:
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak.
ICALP (2) 2008: 616-630 |
5 | EE | Iftach Haitner,
Jonathan J. Hoch,
Gil Segev:
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.
TCC 2008: 445-464 |
2007 |
4 | EE | Iftach Haitner,
Jonathan J. Hoch,
Omer Reingold,
Gil Segev:
Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
FOCS 2007: 669-679 |
3 | EE | Iftach Haitner,
Jonathan J. Hoch,
Omer Reingold,
Gil Segev:
Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
Electronic Colloquium on Computational Complexity (ECCC) 14(038): (2007) |
2006 |
2 | EE | Jonathan J. Hoch,
Adi Shamir:
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions.
FSE 2006: 179-194 |
2004 |
1 | EE | Jonathan J. Hoch,
Adi Shamir:
Fault Analysis of Stream Ciphers.
CHES 2004: 240-253 |