TCS / Research / Publications / Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
Helsinki University of Technology, 
     Laboratory for Theoretical Computer Science

Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?

Reference:

Ahto Buldas and Sven Laur. Do broken hash functions affect the security of time-stamping schemes?. In Jianying Zhou, Moti Yung, and Feng Bao, editors, Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, volume 3989 of Lecture Notes in Computer Science, pages 50–65. Springer, 2006.

Suggested BibTeX entry:

@inproceedings{DBLP:confacnsBuldasL06,
    author = {Ahto Buldas and Sven Laur},
    booktitle = {Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings},
    editor = {Jianying Zhou and Moti Yung and Feng Bao},
    pages = {50--65},
    publisher = {Springer},
    series = {Lecture Notes in Computer Science},
    title = {Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?},
    volume = {3989},
    year = {2006},
}

See dx.doi.org ...

[TCS main] [Contact Info] [Personnel] [Research] [Publications] [Software] [Studies] [News Archive] [Links]
Latest update: 19 January 2010.