메뉴 건너뛰기




Volumn 3715 LNCS, Issue , 2005, Pages 64-83

A family of fast syndrome based cryptographic hash functions

Author keywords

Cryptographic hash functions; NP completeness; Provable security; Syndrome decoding; Wagner's generalized birthday problem

Indexed keywords

ALGORITHMS; ARTIFICIAL INTELLIGENCE; CODES (SYMBOLS); COMPUTER SCIENCE; DATA PRIVACY; ERROR CORRECTION; FUNCTIONS; SECURITY OF DATA;

EID: 33646171290     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11554868_6     Document Type: Conference Paper
Times cited : (64)

References (21)
  • 2
    • 0001949079 scopus 로고    scopus 로고
    • Complexity issues in coding theory
    • V. S. Pless and W. C. Huffman, editors, chapter 7, North-Holland
    • A. Barg. Complexity issues in coding theory. In V. S. Pless and W. C. Huffman, editors, Handbook of Coding theory, volume I, chapter 7, pages 649-754. North-Holland, 1998.
    • (1998) Handbook of Coding Theory , vol.1 , pp. 649-754
    • Barg, A.1
  • 6
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Gilles Brassard, editor, CRYPTO 89. Springer-Verlag
    • I.E. Damgård. A design principle for hash functions. In Gilles Brassard, editor, CRYPTO 89, volume 435 of Lecture Notes in Computer Science, pages 416-426. Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 416-426
    • Damgård, I.E.1
  • 8
    • 33646188704 scopus 로고
    • A practical attack against knapsack based hash functions
    • Alfredo De Santis, editor, Advances in Cryptology - Eurocrypt '94. Springer-Verlag
    • A. Joux and L. Granboulan. A practical attack against knapsack based hash functions. In Alfredo De Santis, editor, Advances in Cryptology - Eurocrypt '94, volume 950 of Lecture Notes in Computer Science, pages 58-66. Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.950 , pp. 58-66
    • Joux, A.1    Granboulan, L.2
  • 9
    • 0022663555 scopus 로고
    • Average case complete problems
    • L. Levin, Average case complete problems. SIAM Journal on Computing, 15(1):285-286, 1986.
    • (1986) SIAM Journal on Computing , vol.15 , Issue.1 , pp. 285-286
    • Levin, L.1
  • 10
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • Jet Prop. Lab., California Inst. Technol., Pasadena, CA, January
    • R. J. McEliece. A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep., Jet Prop. Lab., California Inst. Technol., Pasadena, CA, pages 114-116, January 1978.
    • (1978) DSN Prog. Rep. , pp. 114-116
    • McEliece, R.J.1
  • 12
    • 84937461306 scopus 로고
    • One way hash functions and des
    • Gilles Brassard, editor, Advances in Cryptology - Crypto '89. Springer-Verlag
    • R. C. Merkle. One way hash functions and DES. In Gilles Brassard, editor, Advances in Cryptology - Crypto '89, volume 435 of Lecture Notes in Computer Science, pages 428-446. Springer-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 14
    • 0022582790 scopus 로고
    • Knapsack-type crytosystems and algebraic coding theory
    • H. Niederreiter. Knapsack-type crytosystems and algebraic coding theory. Prob. Contr. Inform. Theory, 15(2):157-166, 1986.
    • (1986) Prob. Contr. Inform. Theory , vol.15 , Issue.2 , pp. 157-166
    • Niederreiter, H.1
  • 15
    • 0005314429 scopus 로고    scopus 로고
    • The state of cryptographic hash functions
    • Ivan Damgaård, editor, Lectures on Data Security: Modern Cryptology in Theory and Practice. Springer-Verlag
    • Bart Preneel. The state of cryptographic hash functions. In Ivan Damgaård, editor, Lectures on Data Security: Modern Cryptology in Theory and Practice, volume 1561 of Lecture Notes in Computer Science, pages 158-182. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1561 , pp. 158-182
    • Preneel, B.1
  • 16
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • A.J. Menezes and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90. Springer-Verlag
    • R. L. Rivest. The MD4 message digest algorithm. In A.J. Menezes and S.A. Vanstone, editors, Advances in Cryptology - CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 303-311. Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.537 , pp. 303-311
    • Rivest, R.L.1
  • 17
    • 35048855067 scopus 로고    scopus 로고
    • Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
    • Bimal Roy and Willi Meier, editors, Fast Software Encryption 2004
    • P. Rogaway and T. Shrimpton. Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In Bimal Roy and Willi Meier, editors, Fast Software Encryption 2004, volume 3017 of Lecture Notes in Computer Science, pages 371-388, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 371-388
    • Rogaway, P.1    Shrimpton, T.2
  • 18
    • 33646166930 scopus 로고    scopus 로고
    • On the security of the McEliece public-key cryptosystem
    • M. Blaum, P.G. Farrell, and H. van Tilborg, editors, Kluwer, Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday
    • N. Sendrier. On the security of the McEliece public-key cryptosystem. In M. Blaum, P.G. Farrell, and H. van Tilborg, editors, Information, Coding and Mathematics, pages 141-163. Kluwer, 2002. Proceedings of Workshop honoring Prof. Bob McEliece on his 60th birthday.
    • (2002) Information, Coding and Mathematics , pp. 141-163
    • Sendrier, N.1
  • 19
    • 84937428040 scopus 로고    scopus 로고
    • A generalized birthday problem
    • M. Yung, editor, CRYPTO 2002. Springer-Verlag
    • D. Wagner. A generalized birthday problem. In M. Yung, editor, CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 288-304. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 288-304
    • Wagner, D.1
  • 20
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the hash functions md4 and ripemd
    • Ronald Cramer, editor, Advances in Cryptology - Eurocrypt 2005, Aarhus, Denmark, May. Springer-Verlag
    • Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu. Cryptanalysis of the hash functions md4 and ripemd. In Ronald Cramer, editor, Advances in Cryptology - Eurocrypt 2005, volume 3494 of Lecture Notes in Computer Science, pages 1-18, Aarhus, Denmark, May 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 21
    • 24944591357 scopus 로고    scopus 로고
    • How to break md5 and other hash functions
    • Ronald Cramer, editor, Advances in Cryptology - Eurocrypt 2005, Aarhus, Denmark, May. Springer-Verlag
    • Xiaoyun Wang and Hongbo Yu. How to break md5 and other hash functions. In Ronald Cramer, editor, Advances in Cryptology - Eurocrypt 2005, volume 3494 of Lecture Notes in Computer Science, pages 19-35, Aarhus, Denmark, May 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.