-
1
-
-
50449107349
-
Black-box analysis of the block-cipher-based hash function constructions from PGV
-
Advances in Cryptology - Crypto'02, Springer-Verlag
-
J. Black, P. Rogaway, and T. Shrimpton. Black-box analysis of the block-cipher-based hash function constructions from PGV, Advances in Cryptology - Crypto'02, Lecture Notes in Computer Science, Vol. 2442, Springer-Verlag, pp. 320-335, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
2
-
-
84981199109
-
A design principle for hash functions
-
Advances in Cryptology - Crypto'89, Springer-Verlag
-
I. B. Damgard. A design principle for hash functions, Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, Vol. 435, Springer-Verlag, pp. 416-427, 1989.
-
(1989)
Lecture Notes in Computer Sciences
, vol.435
, pp. 416-427
-
-
Damgard, I.B.1
-
3
-
-
84958953847
-
Cryptanalysis of MD4
-
Fast Software Encryption, Cambridge Workshop, D. Gollman ed. Springer-Verlag
-
H. Dobbertin. Cryptanalysis of MD4- Fast Software Encryption, Cambridge Workshop. Lecture Notes in Computer Science, vol 1039, D. Gollman ed. Springer-Verlag 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
-
-
Dobbertin, H.1
-
5
-
-
84958957924
-
RIPEMD-160: A strengthened version of RIPEMD
-
Fast Software Encryption, D. Gollmann, ed., Springer-Verlag
-
H. Dobbertin, A. Bosselaers and B. Preneel. RIPEMD-160: A strengthened version of RIPEMD, Fast Software Encryption. Lecture Notes in Computer Science 1039, D. Gollmann, ed., Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
6
-
-
26444546724
-
More problems with hash functions
-
24 Aug
-
H. Finney. More problems with hash functions. The cryptographic mailing list. 24 Aug 2004. http://lists.virus.org/cryptography-0408/msg00124.html.
-
(2004)
The Cryptographic Mailing List
-
-
Finney, H.1
-
7
-
-
33847615890
-
Analysis of double block lengh hash functions
-
Cryptographi and Coding 2003
-
M. Hattori, S. Hirose and S. Yoshida. Analysis of Double Block Lengh Hash Functions. Cryptographi and Coding 2003, LNCS 2898.
-
LNCS
, vol.2898
-
-
Hattori, M.1
Hirose, S.2
Yoshida, S.3
-
8
-
-
26444518104
-
Provably secure double-block-length hash functions in a black-box model
-
to appear in
-
S. Hirose. Provably Secure Double-Block-Length Hash Functions in a Black-Box Model, to appear in ICISC-04.
-
ICISC-04
-
-
Hirose, S.1
-
9
-
-
33645780237
-
Multicollision on iterated hash function
-
Advances in Cryptology, CRYPTO 2004
-
A. Joux. Multicollision on Iterated Hash Function. Advances in Cryptology, CRYPTO 2004, Lecture Notes in Computer Science 3152.
-
Lecture Notes in Computer Science
, vol.3152
-
-
Joux, A.1
-
11
-
-
0001769898
-
Attacks on fast double block length hash functions
-
winter
-
L. Knudsen, X. Lai and B. Preneel. Attacks on fast double block length hash functions. J. Cryptology, vol 11 no 1, winter 1998.
-
(1998)
J. Cryptology
, vol.11
, Issue.1
-
-
Knudsen, L.1
Lai, X.2
Preneel, B.3
-
12
-
-
0036714381
-
Construction of secure and fast hash functions using nonbinary error-correcting codes
-
Sept
-
L. Knudsen and B. Preneel. Construction of Secure and Fast Hash Functions Using Nonbinary Error-Correcting Codes. IEEE transactions on information theory, VOL-48, NO. 9, Sept-2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
-
-
Knudsen, L.1
Preneel, B.2
-
13
-
-
84943283484
-
A generalization of PGV-hash functions and security analysis in black-box model
-
ACISP-2003
-
W. Lee, M. Nandi, P. Sarkar, D. Chang, S. Lee and K. Sakurai A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. Lecture Notes in Computer Science, ACISP-2003.
-
Lecture Notes in Computer Science
-
-
Lee, W.1
Nandi, M.2
Sarkar, P.3
Chang, D.4
Lee, S.5
Sakurai, K.6
-
15
-
-
84937461306
-
One way hash functions and des
-
Advances in Cryptology - Crypto'89, Springer-Verlag
-
R. Merkle. One way hash functions and DES, Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, Vol. 435, Springer-Verlag, pp. 428-446, 1989.
-
(1989)
Lecture Notes in Computer Sciences
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
17
-
-
4043135942
-
-
August
-
NIST/NSA. FIPS 180-2 Secure Hash Standard, August, 2002. http://csrc.nist.gov/ publications/fips/fips180-2/fipsl80-2.pdf
-
(2002)
FIPS 180-2 Secure Hash Standard
-
-
-
18
-
-
85026897539
-
Hash functions based on block ciphers: A synthetic approach
-
Advances in Cryptology-CRYPTO'93, Springer-Verlag
-
B. Preneel, R. Govaerts, and J. Vandewalle. Hash functions based on block ciphers:A synthetic approach, Advances in Cryptology-CRYPTO'93, LNCS, Springer-Verlag, pp. 368-378, 1994.
-
(1994)
LNCS
, pp. 368-378
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
20
-
-
0032682994
-
Towards secure and fast hash functions
-
January
-
T. Satoh, M. Haga and K. Kurosawa. Towards Secure and Fast Hash Functions. IEICE Trans. VOL. E82-A, NO. 1 January, 1999.
-
(1999)
IEICE Trans.
, vol.E82-A
, Issue.1
-
-
Satoh, T.1
Haga, M.2
Kurosawa, K.3
-
21
-
-
26444583274
-
Cryptanalysis of MD5 and SHA
-
Sept
-
B. Schneier. Cryptanalysis of MD5 and SHA. Crypto-Gram Newsletter, Sept-2004. http://www. schneier.com/crypto-gram-0409.htm#3.
-
(2004)
Crypto-gram Newsletter
-
-
Schneier, B.1
|