메뉴 건너뛰기




Volumn 1109, Issue , 1996, Pages 1-15

Keying hash functions for message authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; NETWORK SECURITY;

EID: 35048891868     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68697-5_1     Document Type: Conference Paper
Times cited : (1009)

References (25)
  • 2
    • 0004006818 scopus 로고
    • IETF Network Working Group, RFC 1826, August
    • R. Atkinson, "IP Authentication Header," IETF Network Working Group, RFC 1826, August 1995.
    • (1995) IP Authentication Header
    • Atkinson, R.1
  • 5
    • 84954417747 scopus 로고
    • XOR MACs: New methods for message authentication using finite pseudorandom functions
    • Lecture Notes in ComputerScience, D. Coppersmith ed., Springer- Verlag
    • M. Bellare, R. Guerin and P. Rogaway, "XOR MACs: New methods for message authentication using finite pseudorandom functions," Advances in Cryptology - Crypto 95 Proceedings, Lecture Notes in ComputerScience Vol. 963, D. Coppersmith ed., Springer- Verlag, 1995.
    • (1995) Advances in Cryptology - Crypto 95 Proceedings , vol.963
    • Bellare, M.1    Guerin, R.2    Rogaway, P.3
  • 6
    • 84983089516 scopus 로고
    • The security of cipher block chaining
    • Lecture Notes in Computer Science, Y. Desmedted., Springer-Verlag
    • M. Bellare, J. Kilian and P. Rogaway. "The security of cipher block chaining." Advances in Cryptology - Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedted., Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - Crypto 94 Proceedings , vol.839
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 8
    • 0001744332 scopus 로고
    • A design principle for hash functions
    • Lecture Notes in Computer Science, G. Brassard ed., Springer-Verlag
    • I. Damgård, "A design principle for hash functions," Advances in Cryptology - Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, G. Brassard ed., Springer-Verlag, 1989.
    • (1989) Advances in Cryptology - Crypto 89 Proceedings , vol.435
    • Damgård, I.1
  • 9
    • 85067324972 scopus 로고    scopus 로고
    • MD4 is not collision-free
    • September 1995. To appear in Fast Software Encryption Workshop, Cambridge
    • H. Dobbertin, "MD4 is not collision-free," Manuscript, September 1995. To appear in Fast Software Encryption Workshop, Cambridge, 1996.
    • (1996) Manuscript
    • Dobbertin, H.1
  • 10
    • 85067325638 scopus 로고    scopus 로고
    • MD5 is not collision-free
    • H. Dobbertin, "MD5 is not collision-free," Manuscript, 1996.
    • (1996) Manuscript
    • Dobbertin, H.1
  • 13
    • 0006595839 scopus 로고
    • Message Authentication with MD5
    • Spring
    • B. Kaliski and M. Robshaw, "Message Authentication with MD5," RSA Labs' CryptoBytes, Vol. 1 No. 1, Spring 1995.
    • (1995) RSA Labs' CryptoBytes , vol.1 , Issue.1
    • Kaliski, B.1    Robshaw, M.2
  • 16
    • 0000966673 scopus 로고
    • One way hash functions and DES
    • Lecture Notes in Computer Science, G. Brassard ed., Springer- Verlag, (Based on unpublished paper from 1979 and his Ph. D thesis, Stanford, 1979)
    • R. Merkle, "One way hash functions and DES," Advances in Cryptology - Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, G. Brassard ed., Springer- Verlag, 1989. (Based on unpublished paper from 1979 and his Ph. D thesis, Stanford, 1979).
    • (1989) Advances in Cryptology - Crypto 89 Proceedings , vol.435
    • Merkle, R.1
  • 18
    • 51549120471 scopus 로고
    • MD-x MAC and building fast MACs from hash functions
    • Lecture Notes in Computer Science, D. Coppersmith ed., Springer-Verlag
    • B. Preneel and P. van Oorschot, "MD-x MAC and building fast MACs from hash functions," Advances in Cryptology-Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
    • (1995) Advances in Cryptology-Crypto 95 Proceedings , vol.963
    • Preneel, B.1    van Oorschot, P.2
  • 21
    • 0003629991 scopus 로고
    • FIPS 180-1. Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April
    • FIPS 180-1. Secure Hash Standard. Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April 1995.
    • (1995) Secure Hash Standard. Federal Information Processing Standard (FIPS)
  • 22
    • 1542313506 scopus 로고    scopus 로고
    • Performance Analysis of MD5
    • (See also RFC 1810)
    • J. Touch, "Performance Analysis of MD5," Proceedings of Sigcotnm '95, pp. 77-86. (See also RFC 1810).
    • Proceedings of Sigcotnm '95 , pp. 77-86
    • Touch, J.1
  • 23
    • 84969390190 scopus 로고    scopus 로고
    • Message authentication with one-way hash functions
    • G. Tsudik, "Message authentication with one-way hash functions," Proceedings oflnfo- com 92.
    • Proceedings oflnfo- com 92
    • Tsudik, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.