메뉴 건너뛰기




Volumn E82-A, Issue 1, 1999, Pages 55-61

Towards secure and fast hash functions

Author keywords

Birthday attack; Block cipher; Cryptanalysis; Hash function; Meet inthe middle attack

Indexed keywords

BLOCK CODES; COMPUTATIONAL COMPLEXITY; FUNCTIONS; SECURITY OF DATA;

EID: 0032682994     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (21)

References (23)
  • 1
    • 84937461306 scopus 로고    scopus 로고
    • Advances in Cryptology-CRYPTO'89 Proceedings, ed. G. Brassard, vol.435 of Lecture Notes in Computer Science, pp.428-446, Springer-Verlag, 1990.
    • R.C. Merkle, "One way hash functions and DES," Advances in Cryptology-CRYPTO'89 Proceedings, ed. G. Brassard, vol.435 of Lecture Notes in Computer Science, pp.428-446, Springer-Verlag, 1990.
    • "One way Hash Functions and DES,"
    • Merkle, R.C.1
  • 7
    • 0003445736 scopus 로고    scopus 로고
    • vol.1 of ETH series in Information Processing, Konstanz: Hartung-Gorre Verlag, 1992.
    • X. Lai, "On the design and security of block ciphers," vol.1 of ETH series in Information Processing, Konstanz: Hartung-Gorre Verlag, 1992.
    • "On the Design and Security of Block Ciphers,"
    • Lai, X.1
  • 8
    • 84864418193 scopus 로고    scopus 로고
    • ACISP'97 Information Security and Privacy, vol. 1270 of Lecture Notes in Computer Science, pp.139-146, Springer-Verlag, 1997.
    • X. Yi and K.-Y. Lam, "A new hash function based on block cipher," ACISP'97 Information Security and Privacy, vol. 1270 of Lecture Notes in Computer Science, pp.139-146, Springer-Verlag, 1997.
    • And K.-Y. Lam, "A New Hash Function Based on Block Cipher,"
    • Yi, X.1
  • 15
    • 85026913086 scopus 로고    scopus 로고
    • in Fast Software Encryption, ed. R. Anderson, vol.809 of Lecture Notes in Computer Science, pp.157-165, Springer-Verlag, 1994.
    • X. Lai and L.R. Knudsen, "Attacks on double block length hash functions," in Fast Software Encryption, ed. R. Anderson, vol.809 of Lecture Notes in Computer Science, pp.157-165, Springer-Verlag, 1994.
    • And L.R. Knudsen, "Attacks on Double Block Length Hash Functions,"
    • Lai, X.1
  • 17
    • 84981199109 scopus 로고    scopus 로고
    • Advances in Cryptology-CRYPTO'89 Proceedings, ed. G. Brassard, vol.435 of Lecture Notes in Computer Science, pp.416-427, Springer-Verlag, 1990.
    • I.D. Damgârd, "A design principle for hash functions," Advances in Cryptology-CRYPTO'89 Proceedings, ed. G. Brassard, vol.435 of Lecture Notes in Computer Science, pp.416-427, Springer-Verlag, 1990.
    • "A Design Principle for Hash Functions,"
    • Damgârd, I.D.1
  • 23
    • 0005385598 scopus 로고    scopus 로고
    • Advances in Cryptology-EUROCRYPT '88 Proceedings, ed. G.G. Günther, vol.330 of Lecture Notes in Computer Science, pp.129-156, Springer-Verlag, 1988.
    • M. Girault, R. Cohen, and M. Campana, "A generalized birthday attack," Advances in Cryptology-EUROCRYPT '88 Proceedings, ed. G.G. Günther, vol.330 of Lecture Notes in Computer Science, pp.129-156, Springer-Verlag, 1988.
    • R. Cohen, and M. Campana, "A Generalized Birthday Attack,"
    • Girault, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.