Jonathan J. Hoch

According to our database1, Jonathan J. Hoch authored at least 8 papers between 2004 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
New Second-Preimage Attacks on Hash Functions.
J. Cryptol., 2016

2015
Finding Collisions in Interactive Protocols - Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments.
SIAM J. Comput., 2015

2008
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Second Preimage Attacks on Dithered Hash Functions.
Proceedings of the Advances in Cryptology, 2008

2007
Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007

2006
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2004
Fault Analysis of Stream Ciphers.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004


  Loading...