Jonathan Hoch
Jonathan Hoch
Weizmann Institute of Science
Bestätigte E-Mail-Adresse bei necam.com
Titel
Zitiert von
Zitiert von
Jahr
Fault analysis of stream ciphers
JJ Hoch, A Shamir
International Workshop on Cryptographic Hardware and Embedded Systems, 240-253, 2004
2132004
Finding collisions in interactive protocols-a tight lower bound on the round complexity of statistically-hiding commitments
I Haitner, JJ Hoch, O Reingold, G Segev
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), 669-679, 2007
892007
Second preimage attacks on dithered hash functions
E Andreeva, C Bouillaguet, PA Fouque, JJ Hoch, J Kelsey, A Shamir, ...
Annual International Conference on the Theory and Applications of …, 2008
872008
Breaking the ICE–finding multicollisions in iterated concatenated and expanded (ICE) hash functions
JJ Hoch, A Shamir
International Workshop on Fast Software Encryption, 179-194, 2006
682006
On the strength of the concatenated hash combiner when all the hash functions are weak
JJ Hoch, A Shamir
International Colloquium on Automata, Languages, and Programming, 616-630, 2008
422008
Finding collisions in interactive protocols---tight lower bounds on the round and communication complexities of statistically hiding commitments
I Haitner, JJ Hoch, O Reingold, G Segev
SIAM Journal on Computing 44 (1), 193-242, 2015
292015
Finding collisions in interactive protocols---tight lower bounds on the round and communication complexities of statistically hiding commitments
I Haitner, JJ Hoch, O Reingold, G Segev
SIAM Journal on Computing 44 (1), 193-242, 2015
292015
New second-preimage attacks on hash functions
E Andreeva, C Bouillaguet, O Dunkelman, PA Fouque, J Hoch, J Kelsey, ...
Journal of Cryptology 29 (4), 657-696, 2016
242016
A linear lower bound on the communication complexity of single-server private information retrieval
I Haitner, JJ Hoch, G Segev
Theory of Cryptography Conference, 445-464, 2008
122008
Quel système de stockage pour les architectures Fog?
B Confais, A Lebre, B Parrein
Compas' 2016, 2016
2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–10