메뉴 건너뛰기




Volumn E87-A, Issue 1, 2004, Pages 67-74

On Parallel Hash Functions Based on Block-Ciphers

Author keywords

Block cipher; Hash function

Indexed keywords

FUNCTIONS; NETWORK PROTOCOLS; POLYNOMIALS; PROBABILITY; PROBLEM SOLVING; SET THEORY;

EID: 0842267120     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (4)
  • 1
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash-function constructions from PGV
    • Advances in Cryptology - CRYPTO'02, Springer-Verlag
    • J. Black, P. Rogaway, and T. Shrimpton, "Black-box analysis of the block-cipher-based hash-function constructions from PGV," Advances in Cryptology - CRYPTO'02, Lecture Notes in Computer Science, pp.320-335, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 2
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Advances in Cryptology - CRYPTO'89, Springer-Verlag
    • I. Damgård, "A design principle for hash functions," Advances in Cryptology - CRYPTO'89, Lecture Notes in Computer Science, pp.416-427, Springer-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , pp. 416-427
    • Damgård, I.1
  • 3
    • 0037614498 scopus 로고    scopus 로고
    • How to protect DES against exhaustive key search
    • Earlier version in CRYPTO'96
    • J. Kilian and P. Rogaway, "How to protect DES against exhaustive key search," J. Cryptology, vol.14, no.1, pp.17-35, 2001. Earlier version in CRYPTO'96.
    • (2001) J. Cryptology , vol.14 , Issue.1 , pp. 17-35
    • Kilian, J.1    Rogaway, P.2
  • 4
    • 85026897539 scopus 로고
    • Hash functions based on block ciphers: A synthetic approach
    • Advances in Cryptology - CRYPTO'93, Springer-Verlag
    • B. Preneel, R. Govaerts, and J. Vandewalle, "Hash functions based on block ciphers: A synthetic approach," Advances in Cryptology - CRYPTO'93, Lecture Notes in Computer Science, pp.368-378, Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.