메뉴 건너뛰기




Volumn 3797 LNCS, Issue , 2005, Pages 77-89

Towards optimal double-length hash functions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; DATA COMPRESSION; FUNCTIONS; MATHEMATICAL MODELS; RANDOM PROCESSES;

EID: 33646833289     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11596219_7     Document Type: Conference Paper
Times cited : (16)

References (17)
  • 1
    • 2942747407 scopus 로고    scopus 로고
    • A note on negligible function
    • Springer-Verlag, September
    • M. Bellare. A Note on Negligible Function. Journal of Cryptology, Springer-Verlag, vol 15, No. 4, pp. 271-284, September 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.4 , pp. 271-284
    • Bellare, M.1
  • 3
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Advances in Cryptology - Crypto'89, Springer-Verlag
    • I. B. Damgård. A Design Principle for Hash Functions. Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, vol 435, Springer-Verlag, pp. 416-427, 1989.
    • (1989) Lecture Notes in Computer Sciences , vol.435 , pp. 416-427
    • Damgård, I.B.1
  • 4
    • 26444546724 scopus 로고    scopus 로고
    • More problems with hash functions
    • 24 Aug
    • H. Finney. More problems with hash functions. The cryptographic mailing list, 24 Aug 2004. Available at http://lists.virus.org/cryptography-0408/ msg00124.html.
    • (2004) The Cryptographic Mailing List
    • Finney, H.1
  • 5
    • 33847615890 scopus 로고    scopus 로고
    • Analysis of double block lengh hash functions
    • 9th IMA International Conference Cryptographi and Coding, 2003
    • M. Hattori, S. Hirose and S. Yoshida. Analysis of Double Block Lengh Hash Functions. 9th IMA International Conference Cryptographi and Coding, 2003, Lecture Notes in Computer Science, vol 2898, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2898
    • Hattori, M.1    Hirose, S.2    Yoshida, S.3
  • 7
    • 33645780237 scopus 로고    scopus 로고
    • Multicollision on iterated hash functions. Applications to cascaded constructions
    • Advances in Cryptology - Crypto'04
    • A. Joux. Multicollision on Iterated Hash Functions. Applications to Cascaded Constructions. Advances in Cryptology - Crypto'04, Lecture Notes in Computer Science, vol 3152, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3152
    • Joux, A.1
  • 8
    • 0001769898 scopus 로고    scopus 로고
    • Attacks on fast double block length hash functions
    • L. Knudsen, X. Lai and B. Preneel. Attacks on fast double block length hash functions. Journal of Cryptology, vol 11, no-1, winter, 1998.
    • (1998) Journal of Cryptology , vol.11 , Issue.1 WINTER
    • Knudsen, L.1    Lai, X.2    Preneel, B.3
  • 9
    • 0036714381 scopus 로고    scopus 로고
    • Construction of secure and fast hash functions using nonbinary error-correcting codes
    • Sept
    • L. Knudsen and B. Preneel. Construction of Secure and Fast Hash Functions Using Nonbinary Error-Correcting Codes. IEEE transactions on information theory, vol 48, No. 9, Sept-2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9
    • Knudsen, L.1    Preneel, B.2
  • 10
    • 33646851509 scopus 로고    scopus 로고
    • Design principles for iterated hash functions
    • S. Lucks. Design principles for Iterated Hash Functions. ePrint Archive Report, 2004. Available at http://eprint.iacr.org/2004/253.
    • (2004) ePrint Archive Report
    • Lucks, S.1
  • 11
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Advances in Cryptology - Crypto'89, Springer-Verlag
    • R. Merkle. One Way Hash Functions and DES. Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, Vol. 435, Springer-Verlag, pp. 428-446, 1989.
    • (1989) Lecture Notes in Computer Sciences , vol.435 , pp. 428-446
    • Merkle, R.1
  • 12
    • 0002182072 scopus 로고
    • Secure program load with manipulation detection code
    • C. H. Meyer and M. Schilling. Secure program load with manipulation detection code. Proceedings Securicom, pp. 111-130, 1988.
    • (1988) Proceedings Securicom , pp. 111-130
    • Meyer, C.H.1    Schilling, M.2
  • 13
    • 33646846051 scopus 로고    scopus 로고
    • Security analysis of a 2/3-rate double length compression function in the black-box model
    • M. Nandi, W. Lee, K. Sakurai and S. Lee. Security Analysis of a 2/3-rate Double Length Compression Function in The Black-Box Model. Fast Software Encryption'05, 2005.
    • (2005) Fast Software Encryption'05
    • Nandi, M.1    Lee, W.2    Sakurai, K.3    Lee, S.4
  • 14
    • 33646839217 scopus 로고    scopus 로고
    • Multicollision attacks on generalized hash functions
    • M. Nandi and D. R. Stinson. Multicollision Attacks on Generalized Hash Functions. Cryptology ePrint Archive, 2004. Available at http://eprint.iacr.org/ 2004/330.
    • (2004) Cryptology ePrint Archive
    • Nandi, M.1    Stinson, D.R.2
  • 16
    • 33644685733 scopus 로고    scopus 로고
    • Some observations on the theory of cryptographic hash functions
    • D. R. Stinson. Some observations on the theory of cryptographic hash functions. ePrint Archive Report, 2001. Available at http://eprint.iacr.org/ 2001/020/.
    • (2001) ePrint Archive Report
    • Stinson, D.R.1
  • 17
    • 0032682994 scopus 로고    scopus 로고
    • Towards secure and fast hash functions
    • January
    • T. Satoh, M. Haga and K. Kurosawa. Towards Secure and Fast Hash Functions. IEICE Trans, vol E82-A, No. 1 January, 1999.
    • (1999) IEICE Trans , vol.E82-A , Issue.1
    • Satoh, T.1    Haga, M.2    Kurosawa, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.