Prashant Puniya, Ph.D. - Publications
Affiliations: | 2007 | Computer Science | New York University, New York, NY, United States |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2008 | Dodis Y, Pietrzak K, Puniya P. A new mode of operation for block ciphers and length-preserving MACs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 198-219. DOI: 10.1007/978-3-540-78967-3_12 | 0.416 | |||
2008 | Dodis Y, Puniya P. Getting the best out of existing hash functions; Or what if we are stuck with SHA? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 156-173. DOI: 10.1007/978-3-540-68914-0_10 | 0.474 | |||
2007 | Dodis Y, Puniya P. Feistel networks made public, and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4515: 534-554. | 0.409 | |||
2006 | Dodis Y, Puniya P. On the relation between the Ideal Cipher and the Random Oracle Models Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3876: 184-206. DOI: 10.1007/11681878_10 | 0.464 | |||
2006 | Coron JS, Dodis Y, Malinaud C, Puniya P. Merkle-damgård revisited: How to construct a hash function Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3621: 430-448. | 0.514 | |||
Show low-probability matches. |