메뉴 건너뛰기




Volumn 5, Issue 1, 1999, Pages 20-31

Fast hashing and rotation-symmetric functions

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0242405217     PISSN: 0958695X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (138)

References (24)
  • 1
    • 84955593890 scopus 로고    scopus 로고
    • Fast hasing on the Pentium
    • L. Koblitz, editor, Springer, Lecture Notes in Computer Science No. 1109
    • Antoon Bosselaers, René Govaerts, and Joos Vandewalle. Fast hasing on the Pentium. In L. Koblitz, editor, Advances in Cryptology - CRYPTO'96, pages 298-312. Springer, 1996. Lecture Notes in Computer Science No. 1109.
    • (1996) Advances in Cryptology - CRYPTO'96 , pp. 298-312
    • Bosselaers, A.1    Govaerts, R.2    Vandewalle, J.3
  • 4
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • May
    • H. Feistel. Cryptography and computer privacy. Scientific American, 228:15-23, May 1973.
    • (1973) Scientific American , vol.228 , pp. 15-23
    • Feistel, H.1
  • 5
    • 33947104251 scopus 로고    scopus 로고
    • The nonlinearity of a class of boolean functions with short representation
    • J. Pribyl, editor, CTU Publishing House
    • C. Fontaine. The nonlinearity of a class of boolean functions with short representation. In J. Pribyl, editor, Proceedings of PRAGOCRYPT96, pages 129-144. CTU Publishing House, 1996.
    • (1996) Proceedings of PRAGOCRYPT96 , pp. 129-144
    • Fontaine, C.1
  • 6
    • 0008238518 scopus 로고
    • The strict avalanche criterion: Spectral properties of boolean functions and an extended definition
    • S. Goldwasser, editor, Springer-Verlag, Lecture Notes in Computer Science No. 403
    • R. Forré. The strict avalanche criterion: Spectral properties of boolean functions and an extended definition. In S. Goldwasser, editor, Advances in Cryptology - CRYPTO'88, pages 450-468. Springer-Verlag, 1988. Lecture Notes in Computer Science No. 403.
    • (1988) Advances in Cryptology - CRYPTO'88 , pp. 450-468
    • Forré, R.1
  • 9
    • 84962928435 scopus 로고
    • Nonlinearity criteria for cryptographic functions
    • J.-J. Quisquater and J. Vandewalle, editors, Springer-Verlag, Lecture Notes in Computer Science No. 434
    • W. Meier and O. Staffelbach. Nonlinearity criteria for cryptographic functions. In J.-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology - EUROCRYPT'89, pages 549-562. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 434.
    • (1990) Advances in Cryptology - EUROCRYPT'89 , pp. 549-562
    • Meier, W.1    Staffelbach, O.2
  • 11
    • 85027157211 scopus 로고
    • On the construction of highly nonlinear permutations
    • R.A. Rueppel, editor, Berlin, Springer-Verlag
    • K. Nyberg. On the construction of highly nonlinear permutations. In R.A. Rueppel, editor, Advances in Cryptology - Eurocrypt '92, pages 92-98, Berlin, 1993. Springer-Verlag.
    • (1993) Advances in Cryptology - Eurocrypt '92 , pp. 92-98
    • Nyberg, K.1
  • 12
    • 84955568918 scopus 로고    scopus 로고
    • Generalised Feistel networks
    • K. Kim and T. Matsumoto, editors, Advances in Cryptology - ASIACRYPT'96, Berlin, Springer
    • K. Nyberg. Generalised Feistel networks. In K. Kim and T. Matsumoto, editors, Advances in Cryptology - ASIACRYPT'96, volume 1163 of Lecture Notes in Computer Science, pages 91-104, Berlin, 1996. Springer.
    • (1996) Lecture Notes in Computer Science , vol.1163 , pp. 91-104
    • Nyberg, K.1
  • 16
    • 0003602325 scopus 로고
    • The MD4 message digest algorithm
    • MIT Laboratory for Computer Science, October
    • Ronald L. Rivest. The MD4 message digest algorithm. Technical Report MIT/LCS/TM-434, MIT Laboratory for Computer Science, October 1990.
    • (1990) Technical Report MIT/LCS/TM-434
    • Rivest, R.L.1
  • 17
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • April RFC 1321
    • Ronald L. Rivest. The MD5 message-digest algorithm. Internet Request for Comments, April 1992. RFC 1321.
    • (1992) Internet Request for Comments
    • Rivest, R.L.1
  • 18
    • 0003501661 scopus 로고
    • MD2, MD4, MD5, SHA and other hash functions
    • RSA Laboratories, July
    • M.J.B. Robshaw. MD2, MD4, MD5, SHA and other hash functions. Technical Report TR 101, RSA Laboratories, July 1994.
    • (1994) Technical Report TR 101
    • Robshaw, M.J.B.1
  • 21
    • 84961389779 scopus 로고
    • Nonlinearly balanced boolean functions and their propagation characteristics
    • Douglas R. Stinson, editor, Springer, Lecture Notes in Computer Science No. 773
    • Jennifer Seberry, Xian-Mo Zhang, and Yuliang Zheng. Nonlinearly balanced boolean functions and their propagation characteristics. In Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO'93, pages 49-60. Springer, 1994. Lecture Notes in Computer Science No. 773.
    • (1994) Advances in Cryptology - CRYPTO'93 , pp. 49-60
    • Seberry, J.1    Zhang, X.-M.2    Zheng, Y.3
  • 22
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication theory of secrecy systems. Bell Sys. Tech. J.,28:657-715, 1949.
    • (1949) Bell Sys. Tech. J. , vol.28 , pp. 657-715
    • Shannon, C.E.1
  • 24
    • 84985796228 scopus 로고
    • HAVAL - A one-way hashing algorithm with variable length of output
    • J. Seberry and Y. Zheng, editors, Berlin, Springer-Verlag
    • Y. Zheng, J. Pieprzyk, and J. Seberry. HAVAL - a one-way hashing algorithm with variable length of output. In J. Seberry and Y. Zheng, editors, Advances in Cryptology - AUSCRYPT '92, pages 83-104, Berlin, 1993. Springer-Verlag.
    • (1993) Advances in Cryptology - AUSCRYPT '92 , pp. 83-104
    • Zheng, Y.1    Pieprzyk, J.2    Seberry, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.