Sciweavers

5 search results - page 1 / 1
» Hash Functions from Sigma Protocols and Improvements to VSH
Sort
View
ASIACRYPT
2008
Springer
15 years 3 months ago
Hash Functions from Sigma Protocols and Improvements to VSH
Mihir Bellare, Todor Ristov
STOC
2005
ACM
103views Algorithms» more  STOC 2005»
16 years 1 months ago
New and improved constructions of non-malleable cryptographic protocols
We present a new constant round protocol for non-malleable zero-knowledge. Using this protocol as a subroutine, we obtain a new constant-round protocol for non-malleable commitmen...
Rafael Pass, Alon Rosen
ASIACRYPT
2009
Springer
15 years 7 months ago
Foundations of Non-malleable Hash and One-Way Functions
Non-malleability is an interesting and useful property which ensures that a cryptographic protocol preserves the independence of the underlying values: given for example an encryp...
Alexandra Boldyreva, David Cash, Marc Fischlin, Bo...
PODC
2003
ACM
15 years 6 months ago
Routing networks for distributed hash tables
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determi...
Gurmeet Singh Manku
PERCOM
2009
ACM
16 years 1 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi