메뉴 건너뛰기




Volumn E87-A, Issue 5, 2004, Pages 1092-1097

A note on the strength of weak collision resistance

Author keywords

Hash function; Message authentication code; NMAC; Weak collision resistance

Indexed keywords

CODES (SYMBOLS); COLLISION AVOIDANCE; COMPUTATIONAL METHODS; FUNCTIONS; ITERATIVE METHODS; PROBABILITY; THEOREM PROVING;

EID: 2642525355     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (8)
  • 1
    • 84957098482 scopus 로고    scopus 로고
    • Constructing VIL-MACs from FILMACs: Message authentication under weakened assumptions
    • Proc. CRYPTO'99
    • J.H. An and M. Bellare, "Constructing VIL-MACs from FILMACs: Message authentication under weakened assumptions," Proc. CRYPTO'99, pp.252-269, Lect. Notes Comput. Sci. 1666, 1999.
    • (1999) Proc. CRYPTO'99 , vol.1666 , pp. 252-269
    • An, J.H.1    Bellare, M.2
  • 2
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Proc. CRYPTO'96
    • M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," Proc. CRYPTO'96, Lect. Notes Comput. Sci. 1109, pp.1-15, 1996.
    • (1996) Lect. Notes Comput. Sci. , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 0003729341 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • Network Working Group RFC 2104
    • M. Bellare, R. Canetti, and H. Krawczyk, "HMAC: Keyed-hashing for message authentication," Network Working Group RFC 2104, Lect. Notes Comput. Sci. 1109, 1997.
    • (1997) Lect. Notes Comput. Sci. , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • M. Bellare, J. Kilian, and P. Rogaway, "The security of the cipher block chaining message authentication code," J. Comput. Syst. Sci., vol.61, no.3, pp.362-399, 2000.
    • (2000) J. Comput. Syst. Sci. , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 6
    • 84958663551 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • Proc. CRYPTO'97
    • M. Bellare and P. Rogaway, "Collision-resistant hashing: Towards making UOWHFs practical," Proc. CRYPTO'97, pp.470-84, Lect. Notes Comput. Sci. 1294, 1997.
    • (1997) Lect. Notes Comput. Sci. , vol.1294 , pp. 470-484
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Proc. CRYPTO'89
    • I. Damgård, "A design principle for hash functions," Proc. CRYPTO'89, pp.416-427, Lect. Notes Comput. Sci. 435, 1990.
    • (1990) Lect. Notes Comput. Sci. , vol.435 , pp. 416-427
    • Damgård, I.1
  • 8
    • 84957690790 scopus 로고    scopus 로고
    • Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    • Proc. EUROCRYPT'98
    • D.R. Simon, "Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?" Proc. EUROCRYPT'98, pp.334-345, Lect. Notes Comput. Sci. 1403, 1998.
    • (1998) Lect. Notes Comput. Sci. , vol.1403 , pp. 334-345
    • Simon, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.