Cryptographers' World
 

Prashant Puniya


Author's Web Page Link

5 papers in database with 230 citations 

H-number: 5

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yevgeniy Dodis,  Prashant Puniya,  Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?, pp. 156 - 173, ACNS 2008.

[Electronic Edition][Cited 7 times ]

2. Yevgeniy Dodis,  Krzysztof Pietrzak,  Prashant Puniya,  A New Mode of Operation for Block Ciphers and Length-Preserving MACs, pp. 198 - 219, EUROCRYPT 2008.

[Electronic Edition][Cited 21 times ]

3. Yevgeniy Dodis,  Prashant Puniya,  Feistel Networks Made Public, and Applications, pp. 534 - 554, EUROCRYPT 2007.

[Electronic Edition][Cited 14 times ]

4. Yevgeniy Dodis,  Prashant Puniya,  On the Relation Between the Ideal Cipher and the Random Oracle Models, pp. 184 - 206, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

5. Jean-S√©bastien Coron,  Yevgeniy Dodis,  C√©cile Malinaud,  Prashant Puniya,  Merkle-Damg√•rd Revisited: How to Construct a Hash Function, pp. 430 - 448, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 180 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...