-
2
-
-
24944585801
-
On the impossibility of highly efficient blockcipher-based hash functions
-
J. Black, M. Cochran, and T. Shrimpton. On the impossibility of highly efficient blockcipher-based hash functions. Cryptology ePrint Archive, Report 2004/062, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.62
-
-
Black, J.1
Cochran, M.2
Shrimpton, T.3
-
3
-
-
50449107349
-
Black-box analysis of the block-cipher-based hash-function constructions from PGV
-
Lecture Notes in Computer Science 2442
-
J. Black, P. Rogaway, and T. Shrimpton. Black-box analysis of the block-cipher-based hash-function constructions from PGV. In CRYPTO 2002 Proceedings, pages 320-335, 2002. Lecture Notes in Computer Science 2442.
-
(2002)
CRYPTO 2002 Proceedings
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
4
-
-
24944587416
-
-
Data authentication using modification detection codes based on a public one-way encryption function, mar. U. S. Patent # 4,908,861
-
B. O. Brachtl, D. Coppersmith, M. M. Hyden, S. M. Matyas Jr., C. H. W. Meyer, J. Oseas, S. Pilpel, and M. Schilling. Data authentication using modification detection codes based on a public one-way encryption function, mar 1990. U. S. Patent # 4,908,861.
-
(1990)
-
-
Brachtl, B.O.1
Coppersmith, D.2
Hyden, M.M.3
Matyas Jr., S.M.4
Meyer, C.H.W.5
Oseas, J.6
Pilpel, S.7
Schilling, M.8
-
5
-
-
84981199109
-
A design principle for hash functions
-
Lecture Notes in Computer Science 435
-
I. Damgård. A design principle for hash functions. In CRYPTO'89 Proceedings, pages 416-427, 1990. Lecture Notes in Computer Science 435.
-
(1990)
CRYPTO'89 Proceedings
, pp. 416-427
-
-
Damgård, I.1
-
7
-
-
84957799016
-
Security of iterated hash functions based on block ciphers
-
Lecture Notes in Computer Science 773
-
W. Hohl, X. Lai, T. Meier, and C. Waldvogel. Security of iterated hash functions based on block ciphers. In CRYPTO'93 Proceedings, pages 379-390, 1994. Lecture Notes in Computer Science 773.
-
(1994)
CRYPTO'93 Proceedings
, pp. 379-390
-
-
Hohl, W.1
Lai, X.2
Meier, T.3
Waldvogel, C.4
-
8
-
-
84941161050
-
Hash functions based on block ciphers and quaternary codes
-
Lecture Notes in Computer Science 1163
-
L. Knudsen and B. Preneel. Hash functions based on block ciphers and quaternary codes. In ASIACRYPT'96 Proceedings, pages 77-90, 1996. Lecture Notes in Computer Science 1163.
-
(1996)
ASIACRYPT'96 Proceedings
, pp. 77-90
-
-
Knudsen, L.1
Preneel, B.2
-
9
-
-
84958591161
-
Fast and secure hashing based on codes
-
Lecture Notes in Computer Science 1294
-
L. Knudsen and B. Preneel. Fast and secure hashing based on codes. In CRYPTO'97 Proceedings, pages 485-498, 1997. Lecture Notes in Computer Science 1294.
-
(1997)
CRYPTO'97 Proceedings
, pp. 485-498
-
-
Knudsen, L.1
Preneel, B.2
-
10
-
-
0036714381
-
Construction of secure and fast hash functions using nonbinary error-correcting codes
-
L. Knudsen and B. Preneel. Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Transactions on Information Theory, 48(9):2524-2539, 2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2524-2539
-
-
Knudsen, L.1
Preneel, B.2
-
11
-
-
0001769898
-
Attacks on fast double block length hash functions
-
L. R. Knudsen, X. Lai, and B. Preneel. Attacks on fast double block length hash functions. Journal of Cryptology, 11(1):59-72, 1998.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.1
, pp. 59-72
-
-
Knudsen, L.R.1
Lai, X.2
Preneel, B.3
-
12
-
-
84985820553
-
Hash function based on block ciphers
-
Lecture Notes in Computer Science 658
-
X. Lai and J. L. Massey. Hash function based on block ciphers. In EUROCRYPT'92 Proceedings, pages 55-70, 1993. Lecture Notes in Computer Science 658.
-
(1993)
EUROCRYPT'92 Proceedings
, pp. 55-70
-
-
Lai, X.1
Massey, J.L.2
-
13
-
-
84937407660
-
Tweakable block ciphers
-
Lecture Notes in Computer Science 2442
-
M. Liskov, R. L. Rivest, and D. Wagner. Tweakable block ciphers. In CRYPTO 2002 Proceedings, pages 31-46, 2002. Lecture Notes in Computer Science 2442.
-
(2002)
CRYPTO 2002 Proceedings
, pp. 31-46
-
-
Liskov, M.1
Rivest, R.L.2
Wagner, D.3
-
15
-
-
84937461306
-
One way hash functions and des
-
Lecture Notes in Computer Science 435
-
R. C. Merkle. One way hash functions and DES. In CRYPTO'89 Proceedings, pages 428-446, 1990. Lecture Notes in Computer Science 435.
-
(1990)
CRYPTO'89 Proceedings
, pp. 428-446
-
-
Merkle, R.C.1
-
16
-
-
85026897539
-
Hash functions based on block ciphers: A synthetic approach
-
Lecture Notes in Computer Science 773
-
B. Preneel, R. Govaerts, and J. Vandewalle. Hash functions based on block ciphers: A synthetic approach. In CRYPTO'95 Proceedings, pages 368-378, 1994. Lecture Notes in Computer Science 773.
-
(1994)
CRYPTO'95 Proceedings
, pp. 368-378
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
17
-
-
0032682994
-
Towards secure and fast hash functions
-
T. Satoh, M. Haga, and K. Kurosawa. Towards secure and fast hash functions. IEICE Transactions on Fundamentals, E82-A(1):55-62, 1999.
-
(1999)
IEICE Transactions on Fundamentals
, vol.E82-A
, Issue.1
, pp. 55-62
-
-
Satoh, T.1
Haga, M.2
Kurosawa, K.3
-
18
-
-
24744470329
-
Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD
-
X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199, 2004. http://sprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.199
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
|