메뉴 건너뛰기




Volumn 11, Issue 2, 2006, Pages 100-107

Recent developments in cryptographic hash functions: Security implications and future directions

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY;

EID: 33744729631     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2006.03.007     Document Type: Article
Times cited : (15)

References (29)
  • 1
    • 33744742484 scopus 로고    scopus 로고
    • Bellovin S, Rescorla E. Deploying a new hash algorithm. In: Proceedings of NDSS '06; 2006.
  • 2
    • 33744730522 scopus 로고    scopus 로고
    • Bernstein DJ. Salsa20 specification. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/025, ; 2005.
  • 4
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash-function constructions from PGV
    • CRYPTO, Springer
    • Black J., Rogaway P., and Shrimpton T. Black-box analysis of the block-cipher-based hash-function constructions from PGV. CRYPTO. Lecture notes in computer science vol. 2442 (2002), Springer 320-335
    • (2002) Lecture notes in computer science , vol.2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 7
    • 84958953847 scopus 로고    scopus 로고
    • Cryptanalysis of md4
    • Fast software encryption, Springer
    • Dobbertin H. Cryptanalysis of md4. Fast software encryption. Lecture notes in computer science vol. 1039 (1996), Springer 53-69
    • (1996) Lecture notes in computer science , vol.1039 , pp. 53-69
    • Dobbertin, H.1
  • 8
    • 84958957924 scopus 로고    scopus 로고
    • RIPEMD-160: a strengthened version of RIPEMD
    • Fast software encryption, Springer
    • Dobbertin H., Bosselaers A., and Preneel B. RIPEMD-160: a strengthened version of RIPEMD. Fast software encryption. Lecture notes in computer science vol. 1039 (1996), Springer 71-82
    • (1996) Lecture notes in computer science , vol.1039 , pp. 71-82
    • Dobbertin, H.1    Bosselaers, A.2    Preneel, B.3
  • 9
    • 33744729186 scopus 로고    scopus 로고
    • ECRYPT Network of Excellence. Recent collision attacks on hash functions: ECRYPT position paper. ECRYPT Report, ; 2005.
  • 11
    • 33744768524 scopus 로고    scopus 로고
    • International Organization for Standardization. ISO/IEC 10118-3:2004. Information technology - security techniques - hash-functions - part 3: dedicated hash-functions; 2004.
  • 12
    • 33744720909 scopus 로고    scopus 로고
    • Krawczyk H, Bellare M, Canetti R. HMAC: keyed-hashing for message authentication. Internet RFC 2104; February 1997.
  • 13
    • 33644518261 scopus 로고    scopus 로고
    • Find me a hash
    • Landau S. Find me a hash. Notices of the AMS 53 3 (March 2006) 330-332
    • (2006) Notices of the AMS , vol.53 , Issue.3 , pp. 330-332
    • Landau, S.1
  • 14
    • 33744736793 scopus 로고    scopus 로고
    • Lenstra A, Wang X, Weger B. Colliding x.509 certificates. Cryptology ePrint Archive, Report 2005/067, ; 2005.
  • 17
    • 33744732322 scopus 로고    scopus 로고
    • National Bureau of Standards. The data encryption standard. Federal Information processing standards publication (FIPS) 46; 1977.
  • 18
    • 33744777051 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. Secure hash standard. Federal information processing standards publication (FIPS) 180; 1993.
  • 19
    • 33744751694 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. The advanced encryption standard. Federal information processing standards publication (FIPS) 197; 2001.
  • 20
    • 33744764786 scopus 로고    scopus 로고
    • National Institute of Standards and Technology. Secure hash standard. Federal information processing standards publication (FIPS) 180-2; 2002.
  • 21
    • 33744720581 scopus 로고    scopus 로고
    • Rijmen V, Barreto P. Whirlpool hash function. NESSIE report; 2003.
  • 22
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • CRYPTO 90, Springer
    • Rivest R.L. The MD4 message digest algorithm. CRYPTO 90. Lecture notes in computer science vol. 537 (1991), Springer 303-311
    • (1991) Lecture notes in computer science , vol.537 , pp. 303-311
    • Rivest, R.L.1
  • 23
    • 33744727069 scopus 로고    scopus 로고
    • Rivest RL. The MD5 message-digest algorithm. Internet RFC 1321; 1992.
  • 26
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Eurocrypt 2005, Springer
    • Wang X., and Yu H. How to break MD5 and other hash functions. Eurocrypt 2005. Lecture notes in computer science vol. 3494 (2005), Springer 19-35
    • (2005) Lecture notes in computer science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 27
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the hash functions MD4 and RIPEMD
    • Eurocrypt 2005, Springer
    • Wang X., Lai X., Feng D., Chen H., and Yu X. Cryptanalysis of the hash functions MD4 and RIPEMD. Eurocrypt 2005. Lecture notes in computer science vol. 3494 (2005), Springer 1-18
    • (2005) Lecture notes in computer science , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 28
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • CRYPTO, Springer
    • Wang X., Yin Y.L., and Yu H. Finding collisions in the full SHA-1. CRYPTO. Lecture notes in computer science vol. 3621 (2005), Springer 17-36
    • (2005) Lecture notes in computer science , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 29
    • 74549196057 scopus 로고
    • How to swindle Rabin
    • Yuval G. How to swindle Rabin. Cryptologia 3 (July 1979) 187-189
    • (1979) Cryptologia , vol.3 , pp. 187-189
    • Yuval, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.