-
2
-
-
0001949079
-
Complexity issues in coding theory
-
V. S. Pless and W. C. Huffman, editors, chapter 7, North-Holland
-
A. Barg. Complexity issues in coding theory. In V. S. Pless and W. C. Huffman, editors, Handbook of Coding theory, volume I, chapter 7, pages 649-754. North-Holland, 1998.
-
(1998)
Handbook of Coding Theory
, vol.1
, pp. 649-754
-
-
Barg, A.1
-
6
-
-
84981199109
-
A design principle for hash functions
-
Gilles Brassard, editor, CRYPTO 89. Springer-Verlag
-
I.E. Damgård. A design principle for hash functions. In Gilles Brassard, editor, CRYPTO 89, volume 435 of Lecture Notes in Computer Science, pages 416-426. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 416-426
-
-
Damgård, I.E.1
-
8
-
-
33646188704
-
A practical attack against knapsack based hash functions
-
Alfredo De Santis, editor, Advances in Cryptology - Eurocrypt '94. Springer-Verlag
-
A. Joux and L. Granboulan. A practical attack against knapsack based hash functions. In Alfredo De Santis, editor, Advances in Cryptology - Eurocrypt '94, volume 950 of Lecture Notes in Computer Science, pages 58-66. Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.950
, pp. 58-66
-
-
Joux, A.1
Granboulan, L.2
-
9
-
-
0022663555
-
Average case complete problems
-
L. Levin, Average case complete problems. SIAM Journal on Computing, 15(1):285-286, 1986.
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.1
, pp. 285-286
-
-
Levin, L.1
-
10
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
Jet Prop. Lab., California Inst. Technol., Pasadena, CA, January
-
R. J. McEliece. A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep., Jet Prop. Lab., California Inst. Technol., Pasadena, CA, pages 114-116, January 1978.
-
(1978)
DSN Prog. Rep.
, pp. 114-116
-
-
McEliece, R.J.1
-
12
-
-
84937461306
-
One way hash functions and des
-
Gilles Brassard, editor, Advances in Cryptology - Crypto '89. Springer-Verlag
-
R. C. Merkle. One way hash functions and DES. In Gilles Brassard, editor, Advances in Cryptology - Crypto '89, volume 435 of Lecture Notes in Computer Science, pages 428-446. Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
14
-
-
0022582790
-
Knapsack-type crytosystems and algebraic coding theory
-
H. Niederreiter. Knapsack-type crytosystems and algebraic coding theory. Prob. Contr. Inform. Theory, 15(2):157-166, 1986.
-
(1986)
Prob. Contr. Inform. Theory
, vol.15
, Issue.2
, pp. 157-166
-
-
Niederreiter, H.1
-
15
-
-
0005314429
-
The state of cryptographic hash functions
-
Ivan Damgaård, editor, Lectures on Data Security: Modern Cryptology in Theory and Practice. Springer-Verlag
-
Bart Preneel. The state of cryptographic hash functions. In Ivan Damgaård, editor, Lectures on Data Security: Modern Cryptology in Theory and Practice, volume 1561 of Lecture Notes in Computer Science, pages 158-182. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1561
, pp. 158-182
-
-
Preneel, B.1
-
16
-
-
78650922644
-
The MD4 message digest algorithm
-
A.J. Menezes and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90. Springer-Verlag
-
R. L. Rivest. The MD4 message digest algorithm. In A.J. Menezes and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 303-311. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.537
, pp. 303-311
-
-
Rivest, R.L.1
-
17
-
-
35048855067
-
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
-
Bimal Roy and Willi Meier, editors, Fast Software Encryption 2004
-
P. Rogaway and T. Shrimpton. Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Bimal Roy and Willi Meier, editors, Fast Software Encryption 2004, volume 3017 of Lecture Notes in Computer Science, pages 371-388, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3017
, pp. 371-388
-
-
Rogaway, P.1
Shrimpton, T.2
-
18
-
-
33646166930
-
On the security of the McEliece public-key cryptosystem
-
M. Blaum, P.G. Farrell, and H. van Tilborg, editors, Kluwer, Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday
-
N. Sendrier. On the security of the McEliece public-key cryptosystem. In M. Blaum, P.G. Farrell, and H. van Tilborg, editors, Information, Coding and Mathematics, pages 141-163. Kluwer, 2002. Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday.
-
(2002)
Information, Coding and Mathematics
, pp. 141-163
-
-
Sendrier, N.1
-
19
-
-
84937428040
-
A generalized birthday problem
-
M. Yung, editor, CRYPTO 2002. Springer-Verlag
-
D. Wagner. A generalized birthday problem. In M. Yung, editor, CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 288-304. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 288-304
-
-
Wagner, D.1
-
20
-
-
24944575304
-
Cryptanalysis of the hash functions md4 and ripemd
-
Ronald Cramer, editor, Advances in Cryptology - Eurocrypt 2005, Aarhus, Denmark, May. Springer-Verlag
-
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu. Cryptanalysis of the hash functions md4 and ripemd. In Ronald Cramer, editor, Advances in Cryptology - Eurocrypt 2005, volume 3494 of Lecture Notes in Computer Science, pages 1-18, Aarhus, Denmark, May 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
21
-
-
24944591357
-
How to break md5 and other hash functions
-
Ronald Cramer, editor, Advances in Cryptology - Eurocrypt 2005, Aarhus, Denmark, May. Springer-Verlag
-
Xiaoyun Wang and Hongbo Yu. How to break md5 and other hash functions. In Ronald Cramer, editor, Advances in Cryptology - Eurocrypt 2005, volume 3494 of Lecture Notes in Computer Science, pages 19-35, Aarhus, Denmark, May 2005. Springer-Verlag.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|