dblp.uni-trier.dewww.uni-trier.de

Thomas Shrimpton

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
13EEYevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton: Salvaging Merkle-Damgård for Practical Applications. EUROCRYPT 2009: 371-388
12EEJohn Black, Martin Cochran, Thomas Shrimpton: On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. J. Cryptology 22(3): 311-329 (2009)
2008
11EEThomas Shrimpton, Martijn Stam: Building a Collision-Resistant Compression Function from Non-compressing Primitives. ICALP (2) 2008: 643-654
2007
10EEElena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton: Seven-Property-Preserving Iterated Hashing: ROX. ASIACRYPT 2007: 130-146
9EEThomas Ristenpart, Thomas Shrimpton: How to Build a Hash Function from Any Collision-Resistant Function. ASIACRYPT 2007: 147-163
8EESuresh Singh, Thomas Shrimpton: Verifying Delivered QoS in Multihop Wireless Networks. IEEE Trans. Mob. Comput. 6(12): 1370-1383 (2007)
2006
7EEPhillip Rogaway, Thomas Shrimpton: A Provable-Security Treatment of the Key-Wrap Problem. EUROCRYPT 2006: 373-390
6EEPhilip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson: Threshold Password-Authenticated Key Exchange. J. Cryptology 19(1): 27-66 (2006)
2005
5EEJohn Black, Martin Cochran, Thomas Shrimpton: On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. EUROCRYPT 2005: 526-541
2004
4EEPhillip Rogaway, Thomas Shrimpton: Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. FSE 2004: 371-388
2002
3EEJohn Black, Phillip Rogaway, Thomas Shrimpton: Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. CRYPTO 2002: 320-335
2EEPhilip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson: Threshold Password-Authenticated Key Exchange. CRYPTO 2002: 385-400
1EEJohn Black, Phillip Rogaway, Thomas Shrimpton: Encryption-Scheme Security in the Presence of Key-Dependent Messages. Selected Areas in Cryptography 2002: 62-75

Coauthor Index

1Elena Andreeva [10]
2John Black [1] [3] [5] [12]
3Martin Cochran [5] [12]
4Yevgeniy Dodis [13]
5Markus Jakobsson [2] [6]
6Philip D. MacKenzie [2] [6]
7Gregory Neven [10]
8Bart Preneel [10]
9Thomas Ristenpart [9] [13]
10Phillip Rogaway [1] [3] [4] [7]
11Suresh Singh [8]
12Martijn Stam [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)