The random oracle methodology, revisited.

We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called "cryptographic hash functions".The main result of this article is a negative on...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:Journal of the ACM 51, 4 (2004).
المؤلف الرئيسي: Canetti, Ran
التنسيق: مقال
اللغة:English
الموضوعات: