-
1
-
-
2942747407
-
A note on negligible function
-
Springer-Verlag, September
-
M. Bellare. A Note on Negligible Function. Journal of Cryptology, Springer-Verlag, vol 15, No. 4, pp. 271-284, September 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.4
, pp. 271-284
-
-
Bellare, M.1
-
3
-
-
84981199109
-
A design principle for hash functions
-
Advances in Cryptology - Crypto'89, Springer-Verlag
-
I. B. Damgård. A Design Principle for Hash Functions. Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, vol 435, Springer-Verlag, pp. 416-427, 1989.
-
(1989)
Lecture Notes in Computer Sciences
, vol.435
, pp. 416-427
-
-
Damgård, I.B.1
-
4
-
-
26444546724
-
More problems with hash functions
-
24 Aug
-
H. Finney. More problems with hash functions. The cryptographic mailing list, 24 Aug 2004. Available at http://lists.virus.org/cryptography-0408/ msg00124.html.
-
(2004)
The Cryptographic Mailing List
-
-
Finney, H.1
-
5
-
-
33847615890
-
Analysis of double block lengh hash functions
-
9th IMA International Conference Cryptographi and Coding, 2003
-
M. Hattori, S. Hirose and S. Yoshida. Analysis of Double Block Lengh Hash Functions. 9th IMA International Conference Cryptographi and Coding, 2003, Lecture Notes in Computer Science, vol 2898, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2898
-
-
Hattori, M.1
Hirose, S.2
Yoshida, S.3
-
7
-
-
33645780237
-
Multicollision on iterated hash functions. Applications to cascaded constructions
-
Advances in Cryptology - Crypto'04
-
A. Joux. Multicollision on Iterated Hash Functions. Applications to Cascaded Constructions. Advances in Cryptology - Crypto'04, Lecture Notes in Computer Science, vol 3152, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
-
-
Joux, A.1
-
8
-
-
0001769898
-
Attacks on fast double block length hash functions
-
L. Knudsen, X. Lai and B. Preneel. Attacks on fast double block length hash functions. Journal of Cryptology, vol 11, no-1, winter, 1998.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.1 WINTER
-
-
Knudsen, L.1
Lai, X.2
Preneel, B.3
-
9
-
-
0036714381
-
Construction of secure and fast hash functions using nonbinary error-correcting codes
-
Sept
-
L. Knudsen and B. Preneel. Construction of Secure and Fast Hash Functions Using Nonbinary Error-Correcting Codes. IEEE transactions on information theory, vol 48, No. 9, Sept-2002.
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
-
-
Knudsen, L.1
Preneel, B.2
-
10
-
-
33646851509
-
Design principles for iterated hash functions
-
S. Lucks. Design principles for Iterated Hash Functions. ePrint Archive Report, 2004. Available at http://eprint.iacr.org/2004/253.
-
(2004)
ePrint Archive Report
-
-
Lucks, S.1
-
11
-
-
84937461306
-
One way hash functions and DES
-
Advances in Cryptology - Crypto'89, Springer-Verlag
-
R. Merkle. One Way Hash Functions and DES. Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, Vol. 435, Springer-Verlag, pp. 428-446, 1989.
-
(1989)
Lecture Notes in Computer Sciences
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
12
-
-
0002182072
-
Secure program load with manipulation detection code
-
C. H. Meyer and M. Schilling. Secure program load with manipulation detection code. Proceedings Securicom, pp. 111-130, 1988.
-
(1988)
Proceedings Securicom
, pp. 111-130
-
-
Meyer, C.H.1
Schilling, M.2
-
13
-
-
33646846051
-
Security analysis of a 2/3-rate double length compression function in the black-box model
-
M. Nandi, W. Lee, K. Sakurai and S. Lee. Security Analysis of a 2/3-rate Double Length Compression Function in The Black-Box Model. Fast Software Encryption'05, 2005.
-
(2005)
Fast Software Encryption'05
-
-
Nandi, M.1
Lee, W.2
Sakurai, K.3
Lee, S.4
-
14
-
-
33646839217
-
Multicollision attacks on generalized hash functions
-
M. Nandi and D. R. Stinson. Multicollision Attacks on Generalized Hash Functions. Cryptology ePrint Archive, 2004. Available at http://eprint.iacr.org/ 2004/330.
-
(2004)
Cryptology ePrint Archive
-
-
Nandi, M.1
Stinson, D.R.2
-
16
-
-
33644685733
-
Some observations on the theory of cryptographic hash functions
-
D. R. Stinson. Some observations on the theory of cryptographic hash functions. ePrint Archive Report, 2001. Available at http://eprint.iacr.org/ 2001/020/.
-
(2001)
ePrint Archive Report
-
-
Stinson, D.R.1
-
17
-
-
0032682994
-
Towards secure and fast hash functions
-
January
-
T. Satoh, M. Haga and K. Kurosawa. Towards Secure and Fast Hash Functions. IEICE Trans, vol E82-A, No. 1 January, 1999.
-
(1999)
IEICE Trans
, vol.E82-A
, Issue.1
-
-
Satoh, T.1
Haga, M.2
Kurosawa, K.3
|