메뉴 건너뛰기




Volumn 38, Issue 2, 2006, Pages 259-277

Some observations on the theory of cryptographic hash functions

Author keywords

Collision; Hash family; Hash function; Preimage

Indexed keywords

ALGORITHMS; MATHEMATICAL MODELS; OPTIMIZATION; PROBLEM SOLVING; THEOREM PROVING;

EID: 30744432873     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-005-6344-y     Document Type: Article
Times cited : (111)

References (12)
  • 1
    • 30744457437 scopus 로고    scopus 로고
    • Hash function balance and its impact on birthday attacks
    • Advances in Cryptology - EUROCRYPT 2004
    • M. Bellare and T. Kohno, Hash function balance and its impact on birthday attacks, In Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, Vol. 3027 (2004) pp. 401-418.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 401-418
    • Bellare, M.1    Kohno, T.2
  • 3
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • Advances in Cryptology - EUROCRYPT '94
    • M. Bellare and P. Rogaway, Optimal asymmetric encryption, In Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, Vol. 950 (1995) pp. 92-111.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 14844342644 scopus 로고    scopus 로고
    • Generic groups, collision resistance and ECDSA
    • D. Brown, Generic groups, collision resistance and ECDSA, Designs, Codes and Cryptography, Vol. 35 (2005) 119-152.
    • (2005) Designs, Codes and Cryptography , vol.35 , pp. 119-152
    • Brown, D.1
  • 5
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Lecture Notes in Computer Science
    • I. B. Damgård, A design principle for hash functions, In Advances in Cryptology -CRYPTO '89, Lecture Notes in Computer Science, Vol. 435 (1990) pp. 416-427.
    • (1990) Advances in Cryptology -CRYPTO '89 , vol.435 , pp. 416-427
    • Damgård, I.B.1
  • 7
    • 30744474813 scopus 로고    scopus 로고
    • On a probabilistic approach to the security analysis of cryptographic hash functions
    • Report 2004/324
    • G. Laccetti and G. Schmid, On a probabilistic approach to the security analysis of cryptographic hash functions, In Cryptology ePrint Archive, http://eprint.iacr.org/. Report 2004/324.
    • Cryptology EPrint Archive
    • Laccetti, G.1    Schmid, G.2
  • 10
    • 35048855067 scopus 로고    scopus 로고
    • Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision-resistance
    • Lecture Notes in Computer Science
    • P. Rogaway and T. Shrimpton, Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision-resistance, In FSE 2004, Lecture Notes in Computer Science Vol. 3017 (2004) pp. 371-388.
    • (2004) FSE 2004 , vol.3017 , pp. 371-388
    • Rogaway, P.1    Shrimpton, T.2
  • 11
    • 84957690790 scopus 로고    scopus 로고
    • Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    • Lecture Notes in Computer Science
    • D. R. Simon, Finding collisions on a one-way street: can secure hash functions be based on general assumptions? In Advances in Cryptology - EUROCRYPT '98. Lecture Notes in Computer Science, Vol. 1403 (1998) pp. 334-345.
    • (1998) Advances in Cryptology - EUROCRYPT '98. , vol.1403 , pp. 334-345
    • Simon, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.