-
1
-
-
24944584156
-
Collisions in SHA-0 and reduced SHA-1
-
E. BIHAM, R. CHEN, A. Joux, P. CARRBAULT, W. JALBY, and C. LEMUET, Collisions in SHA-0 and Reduced SHA-1, Advances in Cryptology-Eurocrypt '05, pp. 36-57, 2005.
-
(2005)
Advances in Cryptology - Eurocrypt '05
, pp. 36-57
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carrbault, P.4
Jalby, W.5
Lemuet, C.6
-
2
-
-
84981199109
-
A design principle for hash functions
-
Springer-Verlag LNCS 455
-
I. B. DAMGÅRD, A Design Principle for Hash Functions, Advances in Cryptology-CRYPTO '89, Springer-Verlag LNCS 455, pp. 416-427.
-
Advances in Cryptology - CRYPTO '89
, pp. 416-427
-
-
Damgård, I.B.1
-
3
-
-
84985796089
-
Collisions for the compression function of MD5
-
Springer-Verlag LNCS 765
-
BERT DEN BOER and ANTOON BOSSELAERS, Collisions for the Compression Function of MD5, Advances in Cryptology, Proceedings Eurocrypt '93, Springer-Verlag LNCS 765, 1994, pp. 293-304.
-
(1994)
Advances in Cryptology, Proceedings Eurocrypt '93
, pp. 293-304
-
-
Den Boer, B.1
Bosselaers, A.2
-
4
-
-
84888796316
-
Cryptanalysis of MD5
-
Rump Session
-
HANS DOBBERTIN, Cryptanalysis of MD5, Rump Session, Eurocrypt 1996.
-
Eurocrypt 1996
-
-
Dobbertin, H.1
-
5
-
-
33644518632
-
Collisions for SHA-0
-
Rump Session, August
-
ANTOINE Joux, Collisions for SHA-0, Rump Session, CRYPTO '04, August, 2004.
-
(2004)
CRYPTO '04
-
-
Antoine, J.1
-
6
-
-
0001230046
-
Standing the test of time: The data encryption standard
-
March
-
SUSAN LANDAU, Standing the test of time: The Data Encryption Standard, Notices of the American Mathematical Society, March 2000, pp. 341-349.
-
(2000)
Notices of the American Mathematical Society
, pp. 341-349
-
-
Landau, S.1
-
7
-
-
1442350122
-
Communications security for the twenty-first century: The advanced encryption standard
-
April
-
_, Communications security for the twenty-first century: The Advanced Encryption Standard, Notices of the American Mathematical Society, April 2000, pp. 450-459.
-
(2000)
Notices of the American Mathematical Society
, pp. 450-459
-
-
-
8
-
-
1442328483
-
Polynomials in the nation's service: Using algebra to design the advanced encryption standard
-
February
-
_, Polynomials in the nation's service: Using algebra to design the Advanced Encryption Standard, American Mathematical Monthly, February 2004, pp. 89-117.
-
(2004)
American Mathematical Monthly
, pp. 89-117
-
-
-
10
-
-
0003455038
-
-
UMI Research Press, Ann Arbor, Michigan
-
RALPH MERKLE, Secrecy, Authentication, and Public Key Systems, UMI Research Press, Ann Arbor, Michigan, 1979.
-
(1979)
Secrecy, Authentication, and Public Key Systems
-
-
Merkle, R.1
-
11
-
-
0025545583
-
A fast software one-way hash function
-
_, A fast software one-way hash function, Journal of Cryptology 3 (1979), 43-58.
-
(1979)
Journal of Cryptology
, vol.3
, pp. 43-58
-
-
-
12
-
-
74549196057
-
How to swindle Rabin
-
GIDEON YUVAL, How to swindle Rabin, Cryptologia 3 (1979), 187-190.
-
(1979)
Cryptologia
, vol.3
, pp. 187-190
-
-
Yuval, G.1
-
13
-
-
33644501031
-
Collisions for hash functions
-
Rump Session, August
-
XIAOYUN WANG, DENGGUO FENG, XUEJIA LAI, and HONGBO YU, Collisions for Hash Functions, Rump Session, CRYPTO '04, August, 2004.
-
(2004)
CRYPTO '04
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Hongbo, Y.U.4
-
15
-
-
33644509760
-
New collision search for SHA-1
-
Rump Session, August
-
XIAYUN WANG, ANDREW YAO, and FRANCES YAO, New Collision Search for SHA-1, Rump Session, CRYPTO '05, August 2005.
-
(2005)
CRYPTO '05
-
-
Wang, X.1
Yao, A.2
Yao, F.3
|