-
1
-
-
50449107349
-
Black-box analysis of the block-cipher-based hash function constructions from PGV
-
Advances in Cryptology-Crypto'02, Springer-Verlag
-
J. Black, P. Rogaway, and T. Shrimpton, "Black-box analysis of the block-cipher-based hash function constructions from PGV," Advances in Cryptology-Crypto'02, Lecture Notes in Computer Science, vol.2442, pp.320-335, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
2
-
-
85026897539
-
Hash functions based on block ciphers: A synthetic approach
-
LNCS, Springer-Verlag
-
B. Preneel, R. Govaerts, and J. Vandewalle, "Hash functions based on block ciphers: A synthetic approach," Advances in Cryptology-CRYPTO'93, LNCS, pp.368-378, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-CRYPTO'93
, pp. 368-378
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
3
-
-
85029454400
-
A construction of a cipher from a single pseudorandom permutation
-
Advances in Cryptology-ASIACRYPT'91, Springer-Verlag
-
S. Even and Y. Mansour, "A construction of a cipher from a single pseudorandom permutation," Advances in Cryptology-ASIACRYPT'91, LNCS 739, pp.210-224, Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.739
, pp. 210-224
-
-
Even, S.1
Mansour, Y.2
-
4
-
-
0037614498
-
How to protect DES against exhaustive key search
-
Earlier version in CRYPTO' 96
-
J. Kilian and P. Rogaway, "How to protect DES against exhaustive key search," J. Cryptology, vol.14, no.1, pp. 17-35, 2001. Earlier version in CRYPTO' 96.
-
(2001)
J. Cryptology
, vol.14
, Issue.1
, pp. 17-35
-
-
Kilian, J.1
Rogaway, P.2
-
6
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol.28, no.4, pp.656-715, 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
7
-
-
84958663551
-
Collision-resistant hashing: Towards making UOWHFs practical
-
Advances in Cryptology-Crypto'97, Springer-Verlag
-
M. Bellare and P. Rogaway, "Collision-resistant hashing: Towards making UOWHFs practical," Advances in Cryptology-Crypto'97, Lecture Notes in Computer Science, vol.1294, pp.470-484, Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 470-484
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84981199109
-
A design principle for hash functions
-
Advances in Cryptology - Crypto'89, Springer-Verlag
-
I.B. Damgard, "A design principle for hash functions," Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, vol.435, pp.416-427, Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Sciences
, vol.435
, pp. 416-427
-
-
Damgard, I.B.1
-
9
-
-
84937461306
-
One way hash functions and DES
-
Advances in Cryptology - Crypto'89, Springer-Verlag
-
R. Merkle, "One way hash functions and DES," Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, vol.435, pp.428-446, Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Sciences
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
10
-
-
84945124866
-
Hash functions: From Merkle-Damgard to shoup
-
Advances in Cryptology - Eurocrypt'01, Springer-Verlag
-
I. Mironov, "Hash functions: From Merkle-Damgard to shoup," Advances in Cryptology - Eurocrypt'01, Lecture Notes in Computer Science, vol.2045, pp.166-181, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 166-181
-
-
Mironov, I.1
-
12
-
-
29144504764
-
Construction of UOWHF: Tree Hashing Revisited
-
P. Sarkar, "Construction of UOWHF: Tree Hashing Revisited," Cryptology ePrint Archive, http://eprint.iacr.org/2002/058.
-
Cryptology ePrint Archive
-
-
Sarkar, P.1
-
13
-
-
84948968075
-
A composition theorem for universal one-way hash functions
-
Advances in Cryptology-Eurocrypt'00, Springer-Verlag
-
V. Shoup, "A composition theorem for universal one-way hash functions," Advances in Cryptology-Eurocrypt'00, Lecture Notes in Computer Science, vol.1807, pp.445-452, Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 445-452
-
-
Shoup, V.1
-
14
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
Advances in Cryptology - Eurocrypt'98, Springer-Verlag
-
D. Simon, "Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?," Advances in Cryptology - Eurocrypt'98, Lecture Notes in Computer Science, vol. 1403, pp.334-345, Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 334-345
-
-
Simon, D.1
|