Prashant Puniya

According to our database1, Prashant Puniya authored at least 7 papers between 2005 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
A New Mode of Operation for Block Ciphers and Length-Preserving MACs.
Proceedings of the Advances in Cryptology, 2008

Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
New Design Criteria for Hash Functions and Block Ciphers.
PhD thesis, 2007

Feistel Networks Made Public, and Applications.
Proceedings of the Advances in Cryptology, 2007

2006
Verifiable Random Permutations.
IACR Cryptol. ePrint Arch., 2006

On the Relation Between the Ideal Cipher and the Random Oracle Models.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

2005
Merkle-Damgård Revisited: How to Construct a Hash Function.
Proceedings of the Advances in Cryptology, 2005


  Loading...