메뉴 건너뛰기




Volumn 53, Issue 3, 2006, Pages 330-332

Find me a hash

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33644518261     PISSN: 00029920     EISSN: 10889477     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (8)

References (15)
  • 2
    • 84981199109 scopus 로고    scopus 로고
    • A design principle for hash functions
    • Springer-Verlag LNCS 455
    • I. B. DAMGÅRD, A Design Principle for Hash Functions, Advances in Cryptology-CRYPTO '89, Springer-Verlag LNCS 455, pp. 416-427.
    • Advances in Cryptology - CRYPTO '89 , pp. 416-427
    • Damgård, I.B.1
  • 4
    • 84888796316 scopus 로고    scopus 로고
    • Cryptanalysis of MD5
    • Rump Session
    • HANS DOBBERTIN, Cryptanalysis of MD5, Rump Session, Eurocrypt 1996.
    • Eurocrypt 1996
    • Dobbertin, H.1
  • 5
    • 33644518632 scopus 로고    scopus 로고
    • Collisions for SHA-0
    • Rump Session, August
    • ANTOINE Joux, Collisions for SHA-0, Rump Session, CRYPTO '04, August, 2004.
    • (2004) CRYPTO '04
    • Antoine, J.1
  • 6
    • 0001230046 scopus 로고    scopus 로고
    • Standing the test of time: The data encryption standard
    • March
    • SUSAN LANDAU, Standing the test of time: The Data Encryption Standard, Notices of the American Mathematical Society, March 2000, pp. 341-349.
    • (2000) Notices of the American Mathematical Society , pp. 341-349
    • Landau, S.1
  • 7
    • 1442350122 scopus 로고    scopus 로고
    • Communications security for the twenty-first century: The advanced encryption standard
    • April
    • _, Communications security for the twenty-first century: The Advanced Encryption Standard, Notices of the American Mathematical Society, April 2000, pp. 450-459.
    • (2000) Notices of the American Mathematical Society , pp. 450-459
  • 8
    • 1442328483 scopus 로고    scopus 로고
    • Polynomials in the nation's service: Using algebra to design the advanced encryption standard
    • February
    • _, Polynomials in the nation's service: Using algebra to design the Advanced Encryption Standard, American Mathematical Monthly, February 2004, pp. 89-117.
    • (2004) American Mathematical Monthly , pp. 89-117
  • 11
    • 0025545583 scopus 로고
    • A fast software one-way hash function
    • _, A fast software one-way hash function, Journal of Cryptology 3 (1979), 43-58.
    • (1979) Journal of Cryptology , vol.3 , pp. 43-58
  • 12
    • 74549196057 scopus 로고
    • How to swindle Rabin
    • GIDEON YUVAL, How to swindle Rabin, Cryptologia 3 (1979), 187-190.
    • (1979) Cryptologia , vol.3 , pp. 187-190
    • Yuval, G.1
  • 13
    • 33644501031 scopus 로고    scopus 로고
    • Collisions for hash functions
    • Rump Session, August
    • XIAOYUN WANG, DENGGUO FENG, XUEJIA LAI, and HONGBO YU, Collisions for Hash Functions, Rump Session, CRYPTO '04, August, 2004.
    • (2004) CRYPTO '04
    • Wang, X.1    Feng, D.2    Lai, X.3    Hongbo, Y.U.4
  • 15
    • 33644509760 scopus 로고    scopus 로고
    • New collision search for SHA-1
    • Rump Session, August
    • XIAYUN WANG, ANDREW YAO, and FRANCES YAO, New Collision Search for SHA-1, Rump Session, CRYPTO '05, August 2005.
    • (2005) CRYPTO '05
    • Wang, X.1    Yao, A.2    Yao, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.