-
2
-
-
0004006818
-
-
IETF Network Working Group, RFC 1826, August
-
R. Atkinson, "IP Authentication Header," IETF Network Working Group, RFC 1826, August 1995.
-
(1995)
IP Authentication Header
-
-
Atkinson, R.1
-
5
-
-
84954417747
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
Lecture Notes in ComputerScience, D. Coppersmith ed., Springer- Verlag
-
M. Bellare, R. Guerin and P. Rogaway, "XOR MACs: New methods for message authentication using finite pseudorandom functions," Advances in Cryptology - Crypto 95 Proceedings, Lecture Notes in ComputerScience Vol. 963, D. Coppersmith ed., Springer- Verlag, 1995.
-
(1995)
Advances in Cryptology - Crypto 95 Proceedings
, vol.963
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
6
-
-
84983089516
-
The security of cipher block chaining
-
Lecture Notes in Computer Science, Y. Desmedted., Springer-Verlag
-
M. Bellare, J. Kilian and P. Rogaway. "The security of cipher block chaining." Advances in Cryptology - Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedted., Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - Crypto 94 Proceedings
, vol.839
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
7
-
-
84955593890
-
Fast hashing on the Pentium
-
Lecture Notes in Computer Science Vol.??, N. Koblitz ed., Springer-Verlag
-
A. Bosselaers, R. Govaerts, J. Vandewalle, "Fast hashing on the Pentium," Advances in Cryptology - Crypto 96 Proceedings, Lecture Notes in Computer Science Vol.??, N. Koblitz ed., Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - Crypto 96 Proceedings
-
-
Bosselaers, A.1
Govaerts, R.2
Vandewalle, J.3
-
8
-
-
0001744332
-
A design principle for hash functions
-
Lecture Notes in Computer Science, G. Brassard ed., Springer-Verlag
-
I. Damgård, "A design principle for hash functions," Advances in Cryptology - Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, G. Brassard ed., Springer-Verlag, 1989.
-
(1989)
Advances in Cryptology - Crypto 89 Proceedings
, vol.435
-
-
Damgård, I.1
-
9
-
-
85067324972
-
MD4 is not collision-free
-
September 1995. To appear in Fast Software Encryption Workshop, Cambridge
-
H. Dobbertin, "MD4 is not collision-free," Manuscript, September 1995. To appear in Fast Software Encryption Workshop, Cambridge, 1996.
-
(1996)
Manuscript
-
-
Dobbertin, H.1
-
10
-
-
85067325638
-
MD5 is not collision-free
-
H. Dobbertin, "MD5 is not collision-free," Manuscript, 1996.
-
(1996)
Manuscript
-
-
Dobbertin, H.1
-
12
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser and S. Micali, "How to construct random functions," Journal of the ACM, Vol. 33, No. 4, 210-217, (1986).
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
0006595839
-
Message Authentication with MD5
-
Spring
-
B. Kaliski and M. Robshaw, "Message Authentication with MD5," RSA Labs' CryptoBytes, Vol. 1 No. 1, Spring 1995.
-
(1995)
RSA Labs' CryptoBytes
, vol.1
, Issue.1
-
-
Kaliski, B.1
Robshaw, M.2
-
16
-
-
0000966673
-
One way hash functions and DES
-
Lecture Notes in Computer Science, G. Brassard ed., Springer- Verlag, (Based on unpublished paper from 1979 and his Ph. D thesis, Stanford, 1979)
-
R. Merkle, "One way hash functions and DES," Advances in Cryptology - Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, G. Brassard ed., Springer- Verlag, 1989. (Based on unpublished paper from 1979 and his Ph. D thesis, Stanford, 1979).
-
(1989)
Advances in Cryptology - Crypto 89 Proceedings
, vol.435
-
-
Merkle, R.1
-
18
-
-
51549120471
-
MD-x MAC and building fast MACs from hash functions
-
Lecture Notes in Computer Science, D. Coppersmith ed., Springer-Verlag
-
B. Preneel and P. van Oorschot, "MD-x MAC and building fast MACs from hash functions," Advances in Cryptology-Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology-Crypto 95 Proceedings
, vol.963
-
-
Preneel, B.1
van Oorschot, P.2
-
19
-
-
84947934697
-
On the security of two MAC algorithms
-
U. Maurer ed., Springer-Verlag
-
B. Preneel and P. van Oorschot, "On the security of two MAC algorithms,''Advances in Cryptology - Eurocrypt 96 Proceedings, Lecture Notes in Computer Science Vol. 1070, U. Maurer ed., Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - Eurocrypt 96 Proceedings, Lecture Notes in Computer Science
, vol.1070
-
-
Preneel, B.1
van Oorschot, P.P.2
-
21
-
-
0003629991
-
-
FIPS 180-1. Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April
-
FIPS 180-1. Secure Hash Standard. Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April 1995.
-
(1995)
Secure Hash Standard. Federal Information Processing Standard (FIPS)
-
-
-
22
-
-
1542313506
-
Performance Analysis of MD5
-
(See also RFC 1810)
-
J. Touch, "Performance Analysis of MD5," Proceedings of Sigcotnm '95, pp. 77-86. (See also RFC 1810).
-
Proceedings of Sigcotnm '95
, pp. 77-86
-
-
Touch, J.1
-
23
-
-
84969390190
-
Message authentication with one-way hash functions
-
G. Tsudik, "Message authentication with one-way hash functions," Proceedings oflnfo- com 92.
-
Proceedings oflnfo- com 92
-
-
Tsudik, G.1
|