Sciweavers

5 search results - page 1 / 1
» Hash Functions from Sigma Protocols and Improvements to VSH
Sort
View
ASIACRYPT
2008
Springer
13 years 7 months ago
Hash Functions from Sigma Protocols and Improvements to VSH
Mihir Bellare, Todor Ristov
STOC
2005
ACM
103views Algorithms» more  STOC 2005»
14 years 5 months ago
New and improved constructions of non-malleable cryptographic protocols
We present a new constant round protocol for non-malleable zero-knowledge. Using this protocol as a subroutine, we obtain a new constant-round protocol for non-malleable commitmen...
Rafael Pass, Alon Rosen
ASIACRYPT
2009
Springer
13 years 11 months ago
Foundations of Non-malleable Hash and One-Way Functions
Non-malleability is an interesting and useful property which ensures that a cryptographic protocol preserves the independence of the underlying values: given for example an encryp...
Alexandra Boldyreva, David Cash, Marc Fischlin, Bo...
PODC
2003
ACM
13 years 10 months ago
Routing networks for distributed hash tables
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determi...
Gurmeet Singh Manku
PERCOM
2009
ACM
14 years 5 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi