메뉴 건너뛰기




Volumn 4047 LNCS, Issue , 2006, Pages 210-225

Some plausible constructions of double-block-length hash functions

Author keywords

[No Author keywords available]

Indexed keywords

ITERATIVE METHODS; MATHEMATICAL MODELS; RELATIONAL DATABASE SYSTEMS; SECURITY OF DATA;

EID: 33746721457     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11799313_14     Document Type: Conference Paper
Times cited : (111)

References (26)
  • 1
    • 84941158869 scopus 로고    scopus 로고
    • The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function
    • Also appear in this proceedings
    • J. Black. The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function. Cryptology ePrint Archive, Report 2005/210, 2005. http://eprint.iacr.org/. Also appear in this proceedings.
    • (2005) Cryptology EPrint Archive, Report , vol.2005 , Issue.210
    • Black, J.1
  • 4
    • 84941146911 scopus 로고    scopus 로고
    • Data authentication using modification detection codes based on a public one-way encryption function, mar 1990. U. S. Patent # 4,908,861
    • B. O. Brachtl, D. Coppersmith, M. M. Hyden, S. M. Matyas Jr., C. H. W. Meyer, J. Oseas, S. Pilpel, and M. Schilling. Data authentication using modification detection codes based on a public one-way encryption function, mar 1990. U. S. Patent # 4,908,861.
    • Brachtl, B.O.1    Coppersmith, D.2    Hyden, M.M.3    Matyas Jr., S.M.4    Meyer, C.H.W.5    Oseas, J.6    Pilpel, S.7    Schilling, M.8
  • 15
    • 0036714381 scopus 로고    scopus 로고
    • Construction of secure and fast hash functions using nonbinary error-correcting codes
    • L. Knudsen and B. Preneel. Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Transactions on Information Theory, 48(9):2524-2539, 2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2524-2539
    • Knudsen, L.1    Preneel, B.2
  • 16
    • 0001769898 scopus 로고    scopus 로고
    • Attacks on fast double block length hash functions
    • L. R. Knudsen, X. Lai, and B. Preneel. Attacks on fast double block length hash functions. Journal of Cryptology, 11(1):59-72, 1998.
    • (1998) Journal of Cryptology , vol.11 , Issue.1 , pp. 59-72
    • Knudsen, L.R.1    Lai, X.2    Preneel, B.3
  • 24
    • 84941151008 scopus 로고    scopus 로고
    • A collision attack on a double-block-length hash proposal
    • N. Pramstaller and V. Rijmen. A collision attack on a double-block-length hash proposal. Cryptology ePrint Archive, Report 2006/116, 2006. http://eprint.iacr.org/.
    • (2006) Cryptology EPrint Archive, Report , vol.2006 , Issue.116
    • Pramstaller, N.1    Rijmen, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.