2008 | ||
---|---|---|
5 | EE | Yevgeniy Dodis, Prashant Puniya: Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. ACNS 2008: 156-173 |
4 | EE | Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya: A New Mode of Operation for Block Ciphers and Length-Preserving MACs. EUROCRYPT 2008: 198-219 |
2007 | ||
3 | EE | Yevgeniy Dodis, Prashant Puniya: Feistel Networks Made Public, and Applications. EUROCRYPT 2007: 534-554 |
2006 | ||
2 | EE | Yevgeniy Dodis, Prashant Puniya: On the Relation Between the Ideal Cipher and the Random Oracle Models. TCC 2006: 184-206 |
2005 | ||
1 | EE | Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya: Merkle-Damgård Revisited: How to Construct a Hash Function. CRYPTO 2005: 430-448 |
1 | Jean-Sébastien Coron | [1] |
2 | Yevgeniy Dodis | [1] [2] [3] [4] [5] |
3 | Cécile Malinaud | [1] |
4 | Krzysztof Pietrzak | [4] |