-
1
-
-
84944878354
-
-
CRC Press, Bocâ Roton, 1997.
-
A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, "Handbook of Applied Cryptography," CRC Press, Bocâ Roton, 1997.
-
P.C. Van Oorschot, and S.A. Vanstone, "Handbook of Applied Cryptography,"
-
-
Menezes, A.J.1
-
3
-
-
85027117266
-
-
IEEE Press, New York, 1997.
-
P.P. Chaudhuri, D.R. Chaudhuri, S. Nandi, and S. Chattopadhyay, "Additive Cellular Automata: Theory and Applications," IEEE Press, New York, 1997.
-
D.R. Chaudhuri, S. Nandi, and S. Chattopadhyay, "Additive Cellular Automata: Theory and Applications,"
-
-
Chaudhuri, P.P.1
-
4
-
-
0012523847
-
-
IEEE Trans. Comput., vol.45, pp.782-792, 1996.
-
K. Cattell and J.C. Muzio, "Analysis of one-dimensional linear hybrid cellular automata over GF(g)," IEEE Trans. Comput., vol.45, pp.782-792, 1996.
-
And J.C. Muzio, "Analysis of One-dimensional Linear Hybrid Cellular Automata over GF(g),"
-
-
Cattell, K.1
-
5
-
-
84950781609
-
-
Cryptologia, vol.3, pp. 187-190, 1979.
-
G. Yuval, "How to swindle Rabin," Cryptologia, vol.3, pp. 187-190, 1979.
-
"How to Swindle Rabin,"
-
-
Yuval, G.1
-
6
-
-
84937461306
-
-
Advances in cryptology-CRYPTO 89, Lecture Notes in Computer Science, vol.435, pp.428-446, 1990.
-
R- Merkle, "One way hash functions and DES," Advances in cryptology-CRYPTO 89, Lecture Notes in Computer Science, vol.435, pp.428-446, 1990.
-
"One way Hash Functions and DES,"
-
-
Merkle, R.1
-
7
-
-
84981199109
-
-
Advances in Cryptology-CRYPTO 89, Lecture Notes in Computer Science, vol.435, pp.416-427, 1990.
-
I.D. Damgard, "A design principle for hash functions," Advances in Cryptology-CRYPTO 89, Lecture Notes in Computer Science, vol.435, pp.416-427, 1990.
-
"A Design Principle for Hash Functions,"
-
-
Damgard, I.D.1
-
8
-
-
0003445736
-
-
in ÉTH Series in Information Processing, vol.1, ed. J.L. Massey, Hartung-Gorre Verlag, Konstanz, 1992.
-
X. Lai, "On the design and security of block ciphers," in ÉTH Series in Information Processing, vol.1, ed. J.L. Massey, Hartung-Gorre Verlag, Konstanz, 1992.
-
"On the Design and Security of Block Ciphers,"
-
-
Lai, X.1
-
10
-
-
85028891099
-
-
Advances in cryptologyCRYPTO 90, Lecture Notes in Computer Science, vol.537, pp.303-313, 1991.
-
Y. Zheng, T. Matsumoto, and H. Imai, "Structural properties of one-way hash functions," Advances in cryptologyCRYPTO 90, Lecture Notes in Computer Science, vol.537, pp.303-313, 1991.
-
T. Matsumoto, and H. Imai, "Structural Properties of One-way Hash Functions,"
-
-
Zheng, Y.1
-
11
-
-
84958591161
-
-
Advances in cryptology-CRYPTO 97, Lecture Notes in Computer Science," vol.1294, pp.485-498, 1997.
-
L. Knudsen and B. Preneel, "Fast and secure hashing based on codes," Advances in cryptology-CRYPTO 97, Lecture Notes in Computer Science," vol.1294, pp.485-498, 1997.
-
And B. Preneel, "Fast and Secure Hashing Based on Codes,"
-
-
Knudsen, L.1
-
12
-
-
84983089516
-
-
Advances in cryptology-CRYPTO 94, Lecture Notes in Computer Science, vol.839, pp.341358, 1994.
-
M. Bellare, J. Kilian, and P. Rogavvay, "The security of cipher block Chaining," Advances in cryptology-CRYPTO 94, Lecture Notes in Computer Science, vol.839, pp.341358, 1994.
-
J. Kilian, and P. Rogavvay, "The Security of Cipher Block Chaining,"
-
-
Bellare, M.1
-
13
-
-
85026897539
-
-
Advances in cryptology-CRYPTO 93, Lecture Notes in Computer Science, vol.773, pp.368-378, 1994.
-
B. Preneel, R. Govaerts, and J. Vandewalle, "Hash functions based on block ciphers: A synthetic approach," Advances in cryptology-CRYPTO 93, Lecture Notes in Computer Science, vol.773, pp.368-378, 1994.
-
R. Govaerts, and J. Vandewalle, "Hash Functions Based on Block Ciphers: a Synthetic Approach,"
-
-
Preneel, B.1
-
14
-
-
78650922644
-
-
Advances in cryptology-CRYPTO 90, Lecture Notes in Computer Science, vol.537, pp.303-311, 1991.
-
R.L. Rivest, "The MD4 message-digest algorithm," Advances in cryptology-CRYPTO 90, Lecture Notes in Computer Science, vol.537, pp.303-311, 1991.
-
"The MD4 Message-digest Algorithm,"
-
-
Rivest, R.L.1
-
15
-
-
0003602325
-
-
Internet request for comments 1321, R.L. Rivest, April 1992.
-
RFC 1321, "The MD5 message-digest algorithm," Internet request for comments 1321, R.L. Rivest, April 1992.
-
"The MD5 Message-digest Algorithm,"
-
-
-
16
-
-
0003629990
-
-
Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce / NIST, 1995.
-
FIPS 180-1, "Secure hash standard," Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce / NIST, 1995.
-
"Secure Hash Standard,"
-
-
-
18
-
-
84985796228
-
-
Advances in cryptology-AUSCRYPT 92, Lecture Notes in Computer Science, vol.718, pp.83-104, 1993.
-
Y. Zheng, J. Pieprzyk, and J. Sebery, "HAVAL-A oneway hashing algorithm with variable length of output," Advances in cryptology-AUSCRYPT 92, Lecture Notes in Computer Science, vol.718, pp.83-104, 1993.
-
J. Pieprzyk, and J. Sebery, "HAVAL-A Oneway Hashing Algorithm with Variable Length of Output,"
-
-
Zheng, Y.1
-
19
-
-
84985792472
-
-
Advances in cryptology-ASIACRYPT '91, Lecture Notes in Computer Science, vol.739, 1993.
-
J. Daemen, R. Govaerts, and J. Vandewalle, "A framework for the design of one-way hash functions including cryptanalysis of Damgard's one-way function based on cellular automaton," Advances in cryptology-ASIACRYPT '91, Lecture Notes in Computer Science, vol.739, 1993.
-
R. Govaerts, and J. Vandewalle, "A Framework for the Design of One-way Hash Functions including Cryptanalysis of Damgard's One-way Function Based on Cellular Automaton,"
-
-
Daemen, J.1
-
20
-
-
85027159203
-
-
The 20th Symp. on Information Theory and Its Appl. (SITA97), Matsuyama, Japan, Proc. vol.1, pp.213-216, Dec. 1997.
-
S. Hirose and S. Yoshida, "A one-way hash function based on a two-dimensional cellular automaton," The 20th Symp. on Information Theory and Its Appl. (SITA97), Matsuyama, Japan, Proc. vol.1, pp.213-216, Dec. 1997.
-
And S. Yoshida, "A One-way Hash Function Based on a Two-dimensional Cellular Automaton,"
-
-
Hirose, S.1
-
21
-
-
0031675009
-
-
IEICE Trans. Fundamentals, vol.E81-A, pp.35-40, Jan. 1998.
-
H. Morita, H. Odagi, and K. Ohta, "Collision search of a hash function by using random mapping," IEICE Trans. Fundamentals, vol.E81-A, pp.35-40, Jan. 1998.
-
H. Odagi, and K. Ohta, "Collision Search of a Hash Function by Using Random Mapping,"
-
-
Morita, H.1
-
22
-
-
84992720189
-
-
Advances in cryptology-CRYPTO 85, Lecture Notes in Computer Science, vol.218, pp.429-432, 1985.
-
S. Wolfram, "Cryptography with cellular automata," Advances in cryptology-CRYPTO 85, Lecture Notes in Computer Science, vol.218, pp.429-432, 1985.
-
"Cryptography with Cellular Automata,"
-
-
Wolfram, S.1
-
23
-
-
0025211461
-
-
IEE Proc. Ft. E, vol.137, pp.81-87, Jan. 1990.
-
A.K. Das, A. Ganguly, A. Dasgupta, S. Bhawmik, and P. Pal Chaudhuri, "Efficient characterization of cellular automata," IEE Proc. Ft. E, vol.137, pp.81-87, Jan. 1990.
-
A. Ganguly, A. Dasgupta, S. Bhawmik, and P. Pal Chaudhuri, "Efficient Characterization of Cellular Automata,"
-
-
Das, A.K.1
-
24
-
-
0030104631
-
-
IEEE Trans. ComputerAided Design, vol.15, pp.325-335, March 1996.
-
K. Cattell and J.C. Muzio, "Synthesis of one-dimensional linear hybrid cellular automata," IEEE Trans. ComputerAided Design, vol.15, pp.325-335, March 1996.
-
And J.C. Muzio, "Synthesis of One-dimensional Linear Hybrid Cellular Automata,"
-
-
Cattell, K.1
-
25
-
-
0028750092
-
-
IEEE Trans. Comput., vol.43, pp.1346-1357, Dec. 1994.
-
S. Nandi, B.K. Kar, and P. Pal Chaudhuri, "Theory and applications of cellular automata in cryptography," IEEE Trans. Comput., vol.43, pp.1346-1357, Dec. 1994.
-
B.K. Kar, and P. Pal Chaudhuri, "Theory and Applications of Cellular Automata in Cryptography,"
-
-
Nandi, S.1
-
26
-
-
85013632897
-
-
Advances in Cryptology-EUROCRYPT 91, Lecture Notes in Computer Science, vol.547, pp.186-189, 1992.
-
W. Meier and O. Staffelbach, "Analysis of pseudo random sequences generated by cellular automata," Advances in Cryptology-EUROCRYPT 91, Lecture Notes in Computer Science, vol.547, pp.186-189, 1992.
-
And O. Staffelbach, "Analysis of Pseudo Random Sequences Generated by Cellular Automata,"
-
-
Meier, W.1
-
27
-
-
0031235317
-
-
IEE Proc.-Comput. Digit. Tech., vol.144, pp.279-284, 1997.
-
O.K. Koc and A.M. Apohan, "Inversion of cellular automata iterations," IEE Proc.-Comput. Digit. Tech., vol.144, pp.279-284, 1997.
-
And A.M. Apohan, "Inversion of Cellular Automata Iterations,"
-
-
Koc, O.K.1
-
28
-
-
0031366921
-
-
IEEE Trans. Comput., vol.46, pp.637038, May 1997.
-
S.R. Blackburn, S. Murphy, and K.G. Peterson, "Comments on "Theory and Applications of Cellular Automata in Cryptography"," IEEE Trans. Comput., vol.46, pp.637038, May 1997.
-
S. Murphy, and K.G. Peterson, "Comments on "Theory and Applications of Cellular Automata in Cryptography","
-
-
Blackburn, S.R.1
-
29
-
-
85027119533
-
-
ISITA 96-1996 IEEE Int. Symp. Inform. Theory and Appl., Canada, Victoria, B.C., Proc. pp.246-249, Sept. 1996.
-
M. Mihaljevic, "Security examination of certain cellular automata based key stream generator," ISITA 96-1996 IEEE Int. Symp. Inform. Theory and Appl., Canada, Victoria, B.C., Proc. pp.246-249, Sept. 1996.
-
"Security Examination of Certain Cellular Automata Based Key Stream Generator,"
-
-
Mihaljevic, M.1
-
30
-
-
0012279808
-
-
Applied Algebra, Algorithms and Error Correcting Codes-AAECC 12, Lecture Notes in Computer Science, vol.1255, pp.250-262, 1997.
-
M. Mihaljevic, "Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach," Applied Algebra, Algorithms and Error Correcting Codes-AAECC 12, Lecture Notes in Computer Science, vol.1255, pp.250-262, 1997.
-
"Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach,"
-
-
Mihaljevic, M.1
-
31
-
-
85027185045
-
-
Information and Communication Security-ICICS '97, Lecture Notes in Computer Science, vol.1334, pp.181-191, 1997.
-
M. Mihaljevic, "An improved key stream generator based on the programmable cellular automata," Information and Communication Security-ICICS '97, Lecture Notes in Computer Science, vol.1334, pp.181-191, 1997.
-
"An Improved Key Stream Generator Based on the Programmable Cellular Automata,"
-
-
Mihaljevic, M.1
-
32
-
-
84958983410
-
-
Public Key Cryptography-PKC '98, Lecture Notes in Computer Science, vol.1431, pp.217233, 1998.
-
M. Mihaljevic, Y. Zheng, and H. Imai, "A cellular automaton based fast one-way hash function suitable for hardware implementation," Public Key Cryptography-PKC '98, Lecture Notes in Computer Science, vol.1431, pp.217233, 1998.
-
Y. Zheng, and H. Imai, "A Cellular Automaton Based Fast One-way Hash Function Suitable for Hardware Implementation,"
-
-
Mihaljevic, M.1
|