Semantic Scholar uses AI to extract papers important to this topic.
When Satoshi Nakamoto first set the Bitcoin blockchain into motion in January 2009, he was simultaneously introducing two… Expand We propose a flexible, fairly general, coding for tree hash modes. The coding does not define a tree hash mode, but instead… Expand Order-preserving encryption - an encryption scheme where the sort order of ciphertexts matches the sort order of the… Expand We initiate the study of quantum-secure digital signatures and quantum chosen ciphertext security. In the case of signatures, we… Expand We propose a new composition scheme for hash functions. It is a variant of the Merkle-Damgard construction with a permutation… Expand Recently multi-block collision attacks (MBCA) were found on the Merkle-Damgard (MD)-structure based hash functions MD5, SHA-0 and… Expand The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression function on the input message. The… Expand Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical… Expand The Cooperative File System (CFS) is a new peer-to-peer read-only storage system that provides provable guarantees for the… Expand The cryptographic security of the Merkle-Hellman cryptosystem has been a major open problem since 1976. In this paper we show… Expand