Cryptographers' World
 

Jonathan J. Hoch


Author's Web Page Link

4 papers in database with 124 citations 

H-number: 4

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Elena Andreeva,  Charles Bouillaguet,  Pierre-Alain Fouque,  Jonathan J. Hoch,  John Kelsey,  Adi Shamir,  Sébastien Zimmer,  Second Preimage Attacks on Dithered Hash Functions, pp. 270 - 288, EUROCRYPT 2008.

[Electronic Edition][Cited 33 times ]

2. Iftach Haitner,  Jonathan J. Hoch,  Gil Segev,  A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval, pp. 445 - 464, TCC 2008.

[Electronic Edition][Cited 5 times ]

3. Jonathan J. Hoch,  Adi Shamir,  Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions, pp. 179 - 194, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 29 times ]

4. Jonathan J. Hoch,  Adi Shamir,  Fault Analysis of Stream Ciphers, pp. 240 - 253, CHES 2004.

[Electronic Edition][Cited 57 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...