The random oracle methodology, revisited.

We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called "cryptographic hash functions".The main result of this article is a negative on...

全面介绍

书目详细资料
发表在:Journal of the ACM 51, 4 (2004).
主要作者: Canetti, Ran
格式: 文件
语言:English
主题: