Thomas Shrimpton
Thomas Shrimpton
Professor of Computer Science, University of Florida
Bestätigte E-Mail-Adresse bei ufl.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
P Rogaway, T Shrimpton
International workshop on fast software encryption, 371-388, 2004
6252004
Black-box analysis of the block-cipher-based hash-function constructions from PGV
J Black, P Rogaway, T Shrimpton
Annual International Cryptology Conference, 320-335, 2002
4262002
A provable-security treatment of the key-wrap problem
P Rogaway, T Shrimpton
Annual International Conference on the Theory and Applications of …, 2006
3412006
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
3362012
Encryption-scheme security in the presence of key-dependent messages
J Black, P Rogaway, T Shrimpton
International Workshop on Selected Areas in Cryptography, 62-75, 2002
2652002
Careful with composition: Limitations of the indifferentiability framework
T Ristenpart, H Shacham, T Shrimpton
Annual International Conference on the Theory and Applications of …, 2011
1522011
Threshold password-authenticated key exchange
P MacKenzie, T Shrimpton, M Jakobsson
Annual International Cryptology Conference, 385-400, 2002
1502002
Tag size does matter: Attacks and proofs for the TLS record protocol
KG Paterson, T Ristenpart, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2011
1372011
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1142013
Salvaging Merkle-Damgård for practical applications
Y Dodis, T Ristenpart, T Shrimpton
Annual International Conference on the Theory and Applications of …, 2009
1102009
Reconsidering generic composition
C Namprempre, P Rogaway, T Shrimpton
Annual International Conference on the Theory and Applications of …, 2014
1052014
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2007
992007
On the impossibility of highly-efficient blockcipher-based hash functions
J Black, M Cochran, T Shrimpton
Annual International Conference on the Theory and Applications of …, 2005
962005
Tweakable blockciphers with beyond birthday-bound security
W Landecker, T Shrimpton, RS Terashima
Annual Cryptology Conference, 14-30, 2012
732012
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
712010
An analysis of the blockcipher-based hash functions from PGV
J Black, P Rogaway, T Shrimpton, M Stam
Journal of Cryptology 23 (4), 519-545, 2010
682010
Seeing through network-protocol obfuscation
L Wang, KP Dyer, A Akella, T Ristenpart, T Shrimpton
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
672015
Building a collision-resistant compression function from non-compressing primitives
T Shrimpton, M Stam
International Colloquium on Automata, Languages, and Programming, 643-654, 2008
612008
Threshold password-authenticated key exchange
P MacKenzie, T Shrimpton, M Jakobsson
Journal of Cryptology 19 (1), 27-66, 2006
522006
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
502020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20