-
1
-
-
0002757750
-
Keying hash functions for message authentication
-
presented at the Aug., unpublished
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," presented at the CRYPTO Aug. 1996, unpublished.
-
(1996)
CRYPTO
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
33645004780
-
The NTMAC for authentication of noisy messages
-
Mar.
-
C. G. Boncelet, Jr., "The NTMAC for authentication of noisy messages," IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp. 35-42, Mar. 2006.
-
(2006)
IEEE Trans. Inf. Forensics Security
, vol.1
, Issue.1
, pp. 35-42
-
-
Boncelet Jr., C.G.1
-
3
-
-
33750901987
-
A formal security analysis of approximate message authentication codes
-
College Park, MD, Apr.
-
G. Di Crescenzo, R. Graveman, G. Arce, and R. Ge, "A formal security analysis of approximate message authentication codes," in Proc. ARL CTA on Communications and Networks, College Park, MD, Apr. 2003, pp. 217-221.
-
(2003)
Proc. ARL CTA on Communications and Networks
, pp. 217-221
-
-
Di Crescenzo, G.1
Graveman, R.2
Arce, G.3
Ge, R.4
-
6
-
-
33845618821
-
Approximate image authentication codes
-
College Park, MD
-
R. Gravemen, L. Xie, and G. R. Arce, "Approximate image authentication codes," in Proc. 4th Annu. Symp. Advanced Telecommunications and Information Distribution Research Program, College Park, MD, 2000.
-
(2000)
Proc. 4th Annu. Symp. Advanced Telecommunications and Information Distribution Research Program
-
-
Gravemen, R.1
Xie, L.2
Arce, G.R.3
-
9
-
-
33845641530
-
Advanced encryption standard, federal information processing standard 197
-
Nov.
-
Advanced encryption standard, federal information processing standard 197 Nat. Inst. Standards Technol., Tech. Rep., Nov. 2001.
-
(2001)
Nat. Inst. Standards Technol., Tech. Rep.
-
-
-
10
-
-
0003629990
-
Secure hash standard
-
U.S. Dept. Commerce
-
Secure hash standard Nat. Inst. Standards, Tech. Rep. NIST FIPS PUB 180, U.S. Dept. Commerce, 1993.
-
(1993)
Nat. Inst. Standards, Tech. Rep.
, vol.NIST FIPS PUB 180
-
-
-
11
-
-
84937352160
-
Cyclic codes for error detection
-
Jan.
-
W. Peterson and D. T. Brown, "Cyclic codes for error detection," Proc. IRE, vol. 49, pp. 228-237, Jan. 1961.
-
(1961)
Proc. IRE
, vol.49
, pp. 228-237
-
-
Peterson, W.1
Brown, D.T.2
-
12
-
-
33845646123
-
The great CRC mystery
-
Feb.
-
T. Ritter, "The great CRC mystery," Dr. Dobbs J. Softw. Tools, vol. 11, no. 2, pp. 26-34, Feb. 1986.
-
(1986)
Dr. Dobbs J. Softw. Tools
, vol.11
, Issue.2
, pp. 26-34
-
-
Ritter, T.1
-
13
-
-
0003195066
-
The MD5 message digest algorithm
-
R. Rivest, "The MD5 message digest algorithm," in RFC 1321, 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.1
-
14
-
-
19944425657
-
Collisions for hash functions MD4, MD5, HAVAL-128, and RIPEMD
-
presented at the, Aug., unpublished
-
X. Wang, D. Feng, X. Lai, and H. Yu, "Collisions for hash functions MD4, MD5, HAVAL-128, and RIPEMD," presented at the CRYPTO, Aug. 2004, unpublished.
-
(2004)
CRYPTO
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
-
15
-
-
33845621265
-
Fast image querying using color similarity signatures
-
College Park, MD
-
L. Xie, G. R. Arce, and R. Gravemen, "Fast image querying using color similarity signatures," in Proc. 5th Annu. Symp. Advanced Telecommunications and Information Distribution Research Program, College Park, MD, 2001.
-
(2001)
Proc. 5th Annu. Symp. Advanced Telecommunications and Information Distribution Research Program
-
-
Xie, L.1
Arce, G.R.2
Gravemen, R.3
|