Cryptographers' World
 

Thomas Shrimpton


Author's Web Page Link

10 papers in database with 634 citations StarStar

H-number: 8

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Philip D. MacKenzie,  Thomas Shrimpton,  Markus Jakobsson,  Threshold Password-Authenticated Key Exchange, Journal of Cryptology, Volume 19(1), pp. 27 - 66, Springer, 2006.

[Cited 56 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yevgeniy Dodis,  Thomas Ristenpart,  Thomas Shrimpton,  Salvaging Merkle-Damg√•rd for Practical Applications, pp. 371 - 388, EUROCRYPT 2009.

[Electronic Edition][Cited 17 times ]

2. Thomas Ristenpart,  Thomas Shrimpton,  How to Build a Hash Function from Any Collision-Resistant Function, pp. 147 - 163, ASIACRYPT 2007.

[Electronic Edition][Cited 8 times ]

3. Elena Andreeva,  Gregory Neven,  Bart Preneel,  Thomas Shrimpton,  Seven-Property-Preserving Iterated Hashing: ROX, pp. 130 - 146, ASIACRYPT 2007.

[Electronic Edition][Cited 35 times ]

4. Phillip Rogaway,  Thomas Shrimpton,  A Provable-Security Treatment of the Key-Wrap Problem, pp. 373 - 390, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 28 times ]

5. John Black,  Martin Cochran,  Thomas Shrimpton,  On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions, pp. 526 - 541, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 48 times ]

6. Phillip Rogaway,  Thomas Shrimpton,  Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance, pp. 371 - 388, FSE 2004.

[Electronic Edition][Cited 173 times Red StarRed Star]

7. Philip D. MacKenzie,  Thomas Shrimpton,  Markus Jakobsson,  Threshold Password-Authenticated Key Exchange, pp. 385 - 400, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 73 times Red Star]

8. John Black,  Phillip Rogaway,  Thomas Shrimpton,  Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV, pp. 320 - 335, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 189 times Red StarRed Star]

9. John Black,  Phillip Rogaway,  Thomas Shrimpton,  Encryption-Scheme Security in the Presence of Key-Dependent Messages, pp. 62 - 75, SAC 2002.

[Electronic Edition][Cited 63 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...