메뉴 건너뛰기




Volumn 33, Issue 23, 1997, Pages 1938-1940

Hash function based on block cipher

Author keywords

Cryptography

Indexed keywords

FUNCTIONS; ITERATIVE METHODS; SECURITY OF DATA;

EID: 0031556663     PISSN: 00135194     EISSN: None     Source Type: Journal    
DOI: 10.1049/el:19971336     Document Type: Article
Times cited : (11)

References (5)
  • 2
    • 84985801328 scopus 로고
    • 2n-bit hash functions using 11-bit symmetric blcok cipher algorithm
    • Proc. Advances in Cryptology - EUROCRYPT'89, Springer-Verlag
    • QUISQUATER, J., and GIRAULT, M.: '2n-bit hash functions using 11-bit symmetric blcok cipher algorithm'. Proc. Advances in Cryptology - EUROCRYPT'89, Lecture Notes in Computer Science no. 434, (Springer-Verlag, 1990), pp. 102-109
    • (1990) Lecture Notes in Computer Science No. 434 , pp. 102-109
    • Quisquater, J.1    Girault, M.2
  • 3
    • 84937461306 scopus 로고
    • One way hash functions and des
    • Proc. Advances in Cryptology-CRYPTO'89, Springer-Verlag
    • MERKLE, R.: 'One way hash functions and DES'. Proc. Advances in Cryptology-CRYPTO'89, Lecture Notes in Computer Science no. 435, (Springer-Verlag, 1990), pp. 428-446
    • (1990) Lecture Notes in Computer Science No. 435 , pp. 428-446
    • Merkle, R.1
  • 4
    • 84985820553 scopus 로고
    • Hash functions based on block ciphers
    • Proc. Advances in Cryptology - EUROCRYPT92, 1993, Springer-Verlag
    • LAI, X., and MASSEY, J.: 'Hash functions based on block ciphers'. Proc. Advances in Cryptology - EUROCRYPT92, 1993, Lecture Notes in Computer Science no. 658, (Springer-Verlag, 1993), pp., 55-70
    • (1993) Lecture Notes in Computer Science No. 658 , pp. 55-70
    • Lai, X.1    Massey, J.2
  • 5
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Proc. Advances in Cryptology - EUROCRYPT'89, Springer-Verlag
    • DAMGAARD, I.: 'A design principle for hash functions'. Proc. Advances in Cryptology - EUROCRYPT'89, Lecture Notes in Computer Science no. 435, (Springer-Verlag, 1990), pp. 416-427
    • (1990) Lecture Notes in Computer Science No. 435 , pp. 416-427
    • Damgaard, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.