-
3
-
-
33747325616
-
"The classification of hash functions," in
-
1995, pp. 83-93.
-
R. Anderson, "The classification of hash functions," in Codes and Cyphers: Cryptography and Coding IV, P. G. Farrell, Ed. Inst. Math, and Its Applications (IMA), 1995, pp. 83-93.
-
Codes and Cyphers: Cryptography and Coding IV, P. G. Farrell, Ed. Inst. Math, and Its Applications (IMA)
-
-
Anderson, R.1
-
4
-
-
84955586754
-
"Universal hashing and multiple authentication," in
-
96, Lecture Notes in Computer Science, Vol. 1109, N. Koblitz, Ed. New York: SpringerVerlag, 1996, pp. 16-30.
-
M. Atici and D. Stinson, "Universal hashing and multiple authentication," in Advances in Cryptology, Proc. Crypto'96, Lecture Notes in Computer Science, Vol. 1109, N. Koblitz, Ed. New York: SpringerVerlag, 1996, pp. 16-30.
-
Advances in Cryptology, Proc. Crypto'
-
-
Atici, M.1
Stinson, D.2
-
5
-
-
84983089516
-
J. Kilian, and P. R. Rogaway, "The security of cipher block chaining," in
-
94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 341-358.
-
M. Bellare, J. Kilian, and P. R. Rogaway, "The security of cipher block chaining," in Advances in Cryptology, Proc. Crypto'94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 341-358.
-
Advances in Cryptology, Proc. Crypto'
-
-
Bellare, M.1
-
6
-
-
84954417747
-
R. Guérin, and P. R. Rogaway, "XOR MAC's: New methods for message authentication using block ciphers," in
-
95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlag, 1995, pp. 15-28.
-
M. Bellare, R. Guérin, and P. R. Rogaway, "XOR MAC's: New methods for message authentication using block ciphers," in Advances in Cryptology, Proc. Crypto'95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlag, 1995, pp. 15-28.
-
Advances in Cryptology, Proc. Crypto'
-
-
Bellare, M.1
-
7
-
-
0030416137
-
R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: The cascade construction and its concrete security," in
-
37th Annu. Symp. Foundations of Computer Science. Los Alamitos, ÇA: IEEE Comp. Soc. Press, 1996, pp. 514-523. [Online]. Full version available WWW: http://www-cse.ucsd.edu/users/mihir.
-
M. Bellare, R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: The cascade construction and its concrete security," in Proc. 37th Annu. Symp. Foundations of Computer Science. Los Alamitos, ÇA: IEEE Comp. Soc. Press, 1996, pp. 514-523. [Online]. Full version available WWW: http://www-cse.ucsd.edu/users/mihir.
-
Proc.
-
-
Bellare, M.1
-
8
-
-
35048891868
-
Keying hash functions for message authentication," in
-
96, Lecture Notes in Computer Science, Vol. 1109, N. Koblitx, Ed. New York: Springer-Verlag, 1996, pp. 1-15. [Online]. Full version available WWW: http:// www.research. ibm.com/security/.
-
Keying hash functions for message authentication," in Advances in Cryptology, Proc. Crypto '96, Lecture Notes in Computer Science, Vol. 1109, N. Koblitx, Ed. New York: Springer-Verlag, 1996, pp. 1-15. [Online]. Full version available WWW: http:// www.research. ibm.com/security/.
-
Advances in Cryptology, Proc. Crypto '
-
-
-
9
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication,"
-
2104, Internet Activities Board, Internet Privacy Task Force, Feb. 1997.
-
HMAC: Keyed-hashing for message authentication," Request for Comments (RFC) 2104, Internet Activities Board, Internet Privacy Task Force, Feb. 1997.
-
Request for Comments (RFC)
-
-
-
11
-
-
27544455677
-
"A cryptographic checksum for integrity protection,"
-
vol. 6, no. 5, pp. 505-510, 1987.
-
F. Cohen, "A cryptographic checksum for integrity protection," Comput. Security, vol. 6, no. 5, pp. 505-510, 1987.
-
Comput. Security
-
-
Cohen, F.1
-
12
-
-
84981199109
-
"A design principle for hash functions," in
-
89, Lecture Notes in Computer Science, Vol. 435, G. Brassard, Ed. New York: Springer-Verlag, 1990, pp. 416-427.
-
I. B. Damgârd, "A design principle for hash functions," in Advances in Cryptology, Proc. Crypto'89, Lecture Notes in Computer Science, Vol. 435, G. Brassard, Ed. New York: Springer-Verlag, 1990, pp. 416-427.
-
Advances in Cryptology, Proc. Crypto'
-
-
Damgârd, I.B.1
-
13
-
-
84985785183
-
"A message authenticator algorithm suitable for a mainframe computer," in
-
84, Lecture Notes in Computer Science, Vol. 196, G. R. Blakley and D. Chaum, Eds. New York: Springer-Verlag, 1985, pp. 393-400.
-
D. Davies, "A message authenticator algorithm suitable for a mainframe computer," in Advances in Cryptology, Proc. Crypto'84, Lecture Notes in Computer Science, Vol. 196, G. R. Blakley and D. Chaum, Eds. New York: Springer-Verlag, 1985, pp. 393-400.
-
Advances in Cryptology, Proc. Crypto'
-
-
Davies, D.1
-
16
-
-
85029523925
-
"An attack on the last two rounds of MD4," in
-
91, Lecture Notes in Computer Science, Vol. 576, 3. Feigenbaum, Ed. New York: Springer-Verlag, 1992, pp. 194-203.
-
B. den Boer and A. Bosselaers, "An attack on the last two rounds of MD4," in Advances in Cryptology, Proc. Crypto'91, Lecture Notes in Computer Science, Vol. 576, 3. Feigenbaum, Ed. New York: Springer-Verlag, 1992, pp. 194-203.
-
Advances in Cryptology, Proc. Crypto'
-
-
Den Boer, B.1
Bosselaers, A.2
-
17
-
-
84985796089
-
Collisions for the compression function of MD5," in
-
93, Lecture Notes in Computer Science, Vol. 765, T. Helleseth, Ed. New York: Springer-Verlag, 1994, pp. 293-304.
-
Collisions for the compression function of MD5," in Advances in Cryptology, Proc. Eurocrypt'93, Lecture Notes in Computer Science, Vol. 765, T. Helleseth, Ed. New York: Springer-Verlag, 1994, pp. 293-304.
-
Advances in Cryptology, Proc. Eurocrypt'
-
-
-
18
-
-
84958953847
-
"Cryptanalysis of MD4," in
-
Vol. 1039, D. Gollmann, Ed. New York: Springer-Verlag, 1996, pp. 53-69.
-
H. Dobbertin, "Cryptanalysis of MD4," in Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1039, D. Gollmann, Ed. New York: Springer-Verlag, 1996, pp. 53-69.
-
Fast Software Encryption, Lecture Notes in Computer Science
-
-
Dobbertin, H.1
-
19
-
-
0348175848
-
RIPEMD with two-round compress function is not collisionfree,"
-
vol. 10, no. 1, pp. 51-69, Winter 1997.
-
RIPEMD with two-round compress function is not collisionfree," J. Cryptol, vol. 10, no. 1, pp. 51-69, Winter 1997.
-
J. Cryptol
-
-
-
20
-
-
84958957924
-
A. Bosselaers, and B. Preneel, "RIPEMD-160: A strengthened version of RIPEMD," in
-
Vol. 1039, D. Gollmann, Ed. New York: Springer-Verlag, 1996, pp. 71-82.
-
H. Dobbertin, A. Bosselaers, and B. Preneel, "RIPEMD-160: A strengthened version of RIPEMD," in Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1039, D. Gollmann, Ed. New York: Springer-Verlag, 1996, pp. 71-82.
-
Fast Software Encryption, Lecture Notes in Computer Science
-
-
Dobbertin, H.1
-
25
-
-
33747243362
-
-
3.0," Internet Draft (work in progress), Internet Activities Board, Internet Privacy Task Force, Mar. 1996.
-
A. O. Freier, P. Karlton, and P. C. Kocher, "The SSL protocol version 3.0," Internet Draft (work in progress), Internet Activities Board, Internet Privacy Task Force, Mar. 1996.
-
P. Karlton, and P. C. Kocher, "The SSL protocol version
-
-
Freier, A.O.1
-
26
-
-
33747287036
-
K. McCloghrie, and J. R. Davin, "Secure management of SNMP networks,"
-
1991, pp. 703-714.
-
J. M. Galvin, K. McCloghrie, and J. R. Davin, "Secure management of SNMP networks," Integrated Network Management, II, I. Krishnan and W. Zimmer, Eds. Amsterdam, The Netherlands: North-Holland, 1991, pp. 703-714.
-
Integrated Network Management, II, I. Krishnan and W. Zimmer, Eds. Amsterdam, the Netherlands: North-Holland
-
-
Galvin, J.M.1
-
27
-
-
0005385598
-
R. Cohen, and M. Campana, "A generalized birthday attack," in
-
88, Lecture Notes in Computer Science, Vol. 330, C. G. Günther, Ed. New York: SpringerVerlag, 1988, pp. 129-156.
-
M. Girault, R. Cohen, and M. Campana, "A generalized birthday attack," in Advances in Cryptology, Proc. Eurocrypt '88, Lecture Notes in Computer Science, Vol. 330, C. G. Günther, Ed. New York: SpringerVerlag, 1988, pp. 129-156.
-
Advances in Cryptology, Proc. Eurocrypt '
-
-
Girault, M.1
-
30
-
-
84878363139
-
G. Kabatianskii, and B. Smeets, "On the relation between A-codes and codes correcting independent errors," in
-
93, Lecture Notes in Computer Science, Vol. 765, T. Helleseth, Ed. New York: Springer-Verlag, 1994, pp. 1-11.
-
T. Johansson, G. Kabatianskii, and B. Smeets, "On the relation between A-codes and codes correcting independent errors," in Advances in Cryptology, Proc. Eurocrypt'93, Lecture Notes in Computer Science, Vol. 765, T. Helleseth, Ed. New York: Springer-Verlag, 1994, pp. 1-11.
-
Advances in Cryptology, Proc. Eurocrypt'
-
-
Johansson, T.1
-
31
-
-
0020923149
-
S. M. Matyas, and C. H. Meyer, "Message authentication with manipulation detection codes," in
-
1983 IEEE Symp. Security and Privacy. Los Alamitos, CA: IEEE Comp. Soc. Press, 1983, pp. 33-54.
-
R. R. Jueneman, S. M. Matyas, and C. H. Meyer, "Message authentication with manipulation detection codes," in Proc. 1983 IEEE Symp. Security and Privacy. Los Alamitos, CA: IEEE Comp. Soc. Press, 1983, pp. 33-54.
-
Proc.
-
-
Jueneman, R.R.1
-
32
-
-
0006595839
-
"Message authentication with MD5,"
-
vol. 1, no. 1, pp. 5-8, Spring 1995.
-
B. Kaliski and M. Robshaw, "Message authentication with MD5," CryptoBytes (RSA Lab. Tech. Newslett.), vol. 1, no. 1, pp. 5-8, Spring 1995.
-
CryptoBytes (RSA Lab. Tech. Newslett.)
-
-
Kaliski, B.1
Robshaw, M.2
-
33
-
-
0031546278
-
"A chosen text attack on CBC-MAC,"
-
vol. 33, no. 1, pp. 48_49, 1997.
-
L. R. Knudsen, "A chosen text attack on CBC-MAC," Electron. Lett., vol. 33, no. 1, pp. 48_49, 1997.
-
Electron. Lett.
-
-
Knudsen, L.R.1
-
34
-
-
84991939136
-
"LFSR-based hashing and authentication," in
-
94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 129-139.
-
H. Krawczyk, "LFSR-based hashing and authentication," in Advances in Cryptology, Proc. Cryto'94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 129-139.
-
Advances in Cryptology, Proc. Cryto'
-
-
Krawczyk, H.1
-
35
-
-
33747246246
-
-
5 GSS-API mechanism," Request for Comments (RFC) 1964, Internet Activities Board, Internet Privacy Task Force, June 1996.
-
J. Linn, "The Kerberos version 5 GSS-API mechanism," Request for Comments (RFC) 1964, Internet Activities Board, Internet Privacy Task Force, June 1996.
-
"The Kerberos version
-
-
Linn, J.1
-
36
-
-
33747285760
-
"A new method for known plaintext attack of FEAL cipher," in
-
92, Lecture Notes in Computer Science, Vol. 658, R. A. Rueppel, Ed. New York: SpringerVerlag, 1993, pp. 81-91.
-
M. Matsui, "A new method for known plaintext attack of FEAL cipher," in Advances in Cryptology, Proc. Eurocrypt'92, Lecture Notes in Computer Science, Vol. 658, R. A. Rueppel, Ed. New York: SpringerVerlag, 1993, pp. 81-91.
-
Advances in Cryptology, Proc. Eurocrypt'
-
-
Matsui, M.1
-
37
-
-
85028754650
-
The first experimental cryptanalysis of the data encryption standard," in
-
94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 1-11.
-
The first experimental cryptanalysis of the data encryption standard," in Advances in Cryptology, Proc. Cryto'94, Lecture Notes in Computer Science, Vol. 839, Y. Desmedt, Ed. New York: Springer-Verlag, 1994, pp. 1-11.
-
Advances in Cryptology, Proc. Cryto'
-
-
-
38
-
-
0042026935
-
-
5," Request for Comments (RFC) 1828, Internet Activities Board, Internet Privacy Task Force, Aug. 1995.
-
P. Metzger and W. Simpson, "IP authentication using keyed MD5," Request for Comments (RFC) 1828, Internet Activities Board, Internet Privacy Task Force, Aug. 1995.
-
"IP authentication using keyed MD
-
-
Metzger, P.1
Simpson, W.2
-
39
-
-
50849147684
-
"Solutions to the multidestination secure electronic mail problem," in
-
vol. 7, no. 5, pp. 483_488, 1988.
-
C. Mitchell and M. Walker, "Solutions to the multidestination secure electronic mail problem," in Comput. Security, vol. 7, no. 5, pp. 483_488, 1988.
-
Comput. Security
-
-
Mitchell, C.1
Walker, M.2
-
40
-
-
33747277698
-
"Analysis and design of cryptographic hash functions," Katholieke Universiteit Leuven, Belgium, Doctoral dissertation, Jan. 1993 updated version to be published as
-
B. Preneel, "Analysis and design of cryptographic hash functions," Katholieke Universiteit Leuven, Belgium, Doctoral dissertation, Jan. 1993 (updated version to be published as Cryptographic Hash Functions. Boston, MA: Kluwer).
-
Cryptographic Hash Functions. Boston, MA: Kluwer.
-
-
Preneel, B.1
-
41
-
-
51549120471
-
"MDx-MAC and building fast MAC's from hash functions," in
-
95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlang, 1995, pp. 1-14.
-
B. Preneel and P. C. van Oorschot, "MDx-MAC and building fast MAC's from hash functions," in Advances in Cryptology, Proc. Crypto'95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlang, 1995, pp. 1-14.
-
Advances in Cryptology, Proc. Crypto'
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
42
-
-
33747272934
-
On the security of two MAC algorithms," in
-
96, Lecture Notes in Computer Science, Vol. 1070, U. Maurer, Ed. New York: Springer-Verlag, 1996, pp. 19-32.
-
On the security of two MAC algorithms," in Advances in Cryptology, Proc. Eurocrypt'96, Lecture Notes in Computer Science, Vol. 1070, U. Maurer, Ed. New York: Springer-Verlag, 1996, pp. 19-32.
-
Advances in Cryptology, Proc. Eurocrypt'
-
-
-
43
-
-
0030216031
-
A key recovery attack on the ANSI X9.19 retail MAC,"
-
vol. 32, no. 17, pp. 1568-1569, 1996.
-
A key recovery attack on the ANSI X9.19 retail MAC," Electron. Lett., vol. 32, no. 17, pp. 1568-1569, 1996.
-
Electron. Lett.
-
-
-
44
-
-
0031223633
-
V. Rijmen, and P. C. van Oorschot, "A security analysis of the message authenticator algorithm (MAA),"
-
vol. 8, no. 5, pp. 455_470, 1997.
-
B. Preneel, V. Rijmen, and P. C. van Oorschot, "A security analysis of the message authenticator algorithm (MAA)," Europ. Trans. Telecommun., vol. 8, no. 5, pp. 455_470, 1997.
-
Europ. Trans. Telecommun.
-
-
Preneel, B.1
-
45
-
-
33747305114
-
-
1040, " Lecture Notes in Computer Science, Vol. 1007, A. Bosselaers and B. Preneel, Eds. New York: Springer-Verlag, 1995.
-
RIPE, Integrity Primitives for Secure Information Systems, Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040), " Lecture Notes in Computer Science, Vol. 1007, A. Bosselaers and B. Preneel, Eds. New York: Springer-Verlag, 1995.
-
RIPE, Integrity Primitives for Secure Information Systems, Final Report of RACE Integrity Primitives Evaluation RIPE-RACE
-
-
-
46
-
-
78650922644
-
"The MD4 message digest algorithm," in
-
90, Lecture Notes in Computer Science, Vol. 537, S. Vanstone, Ed. New York: Springer-Verlag, 1991, pp. 303-311.
-
R. L. Rivest, "The MD4 message digest algorithm," in Advances in Cryptology, Proc. Crypto'90, Lecture Notes in Computer Science, Vol. 537, S. Vanstone, Ed. New York: Springer-Verlag, 1991, pp. 303-311.
-
Advances in Cryptology, Proc. Crypto'
-
-
Rivest, R.L.1
-
48
-
-
84957645558
-
"Bucket hashing and its application to fast message authentication," in
-
95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlang, 1995, pp. 29_412.
-
P. R. Rogaway, "Bucket hashing and its application to fast message authentication," in Advances in Cryptology, Proc. Crypto'95, Lecture Notes in Computer Science, Vol. 963, D. Coppersmith, Ed. New York: Springer-Verlang, 1995, pp. 29_412.
-
Advances in Cryptology, Proc. Crypto'
-
-
Rogaway, P.R.1
-
49
-
-
0347506735
-
"Message authentication with one-way hash functions,"
-
vol. 22, no. 5, pp. 29-38, 1992.
-
G. Tsudik, "Message authentication with one-way hash functions," ACM Comput. Commun. Rev., vol. 22, no. 5, pp. 29-38, 1992.
-
ACM Comput. Commun. Rev.
-
-
Tsudik, G.1
-
50
-
-
84948973102
-
"On the need for multipermutations: Cryptanalysis of MD4 and SAFER," in
-
Vol. 1008, B. Preneel, Ed. New York: Springer-Verlag, 1995, pp. 286-297.
-
S. Vaudenay, "On the need for multipermutations: Cryptanalysis of MD4 and SAFER," in Fast Software Encryption, Lecture Notes in Computer Science, Vol. 1008, B. Preneel, Ed. New York: Springer-Verlag, 1995, pp. 286-297.
-
Fast Software Encryption, Lecture Notes in Computer Science
-
-
Vaudenay, S.1
-
51
-
-
0019572642
-
"New hash functions and their use in authentication and set equality,"
-
vol. 22, no. 3, pp. 265-279, 1981.
-
M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Sys. Sci., vol. 22, no. 3, pp. 265-279, 1981.
-
J. Comput. Sys. Sci.
-
-
Wegman, M.N.1
Carter, J.L.2
-
52
-
-
33747265763
-
"Efficient des key search," presented at rump session of Crypto'93, Santa Barbara, CA. Reprinted in
-
1996, pp. 31-79.
-
M. J. Wiener, "Efficient DES key search," presented at rump session of Crypto'93, Santa Barbara, CA. Reprinted in Practical Cryptography for Data Internetworks, W. Stallings, Ed. Los Alamitos, CA: IEEE Comp. Soc. Press, 1996, pp. 31-79.
-
Practical Cryptography for Data Internetworks, W. Stallings, Ed. Los Alamitos, CA: IEEE Comp. Soc. Press
-
-
Wiener, M.J.1
|