-
1
-
-
0003508558
-
Advanced encryption standard (AES)
-
National Institute of Standards and Technology, U.S. Department of Commerce
-
National Institute of Standards and Technology, U.S. Department of Commerce. Advanced Encryption Standard (AES). Federal Information Processing Standard 197, 2001.
-
(2001)
Federal Information Processing Standard 197
-
-
-
2
-
-
0003629991
-
Secure hash standard
-
National Institute of Standards and Technology, U.S. Department of Commerce
-
National Institute of Standards and Technology, U.S. Department of Commerce. Secure hash standard. Federal Information Processing Standard, FIPS-180-1, 1995.
-
(1995)
Federal Information Processing Standard, FIPS-180-1
-
-
-
3
-
-
0003629991
-
Secure hash standard
-
National Institute of Standards and Technology, U.S. Department of Commerce
-
National Institute of Standards and Technology, U.S. Department of Commerce. Secure hash standard. Federal Information Processing Standard, FIPS-180, 1993.
-
(1993)
Federal Information Processing Standard, FIPS-180
-
-
-
4
-
-
0013091373
-
The keyed-hash message authentication code (HMAC)
-
National Institute of Standards and Technology, U.S. Department of Commerce
-
National Institute of Standards and Technology, U.S. Department of Commerce. The Keyed-Hash Message Authentication Code (HMAC). Federal Information Processing Standard 198, 2002.
-
(2002)
Federal Information Processing Standard 198
-
-
-
5
-
-
35048891868
-
Keying hash functions for message authentication
-
Springer-Verlag
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying Hash Functions for Message Authentication. Advances in Cryptology - CRYPTO'96, 16th Annual International Cryptology Conference, Lecture Notes in Computer Science 1109, pp. 1-15, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - CRYPTO'96, 16th Annual International Cryptology Conference, Lecture Notes in Computer Science 1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
6
-
-
35048892549
-
Near-collisions of SHA-0
-
Springer-Verlag
-
Eli Biham and Rafi Chen. Near-Collisions of SHA-0. Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Lecture Notes in Computer Science 3152, pp. 290-305, Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Lecture Notes in Computer Science 3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
7
-
-
24944584156
-
Collisions of SHA-0 and reduced SHA-1
-
Springer-Verlag
-
Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, and William Jalby. Collisions of SHA-0 and Reduced SHA-1. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science 3494, pp. 36-57, Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science 3494
, pp. 36-57
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Lemuet, C.5
Jalby, W.6
-
9
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Springer-Verlag
-
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, and Phillip Rogaway. UMAC: Fast and Secure Message Authentication. Advances in Cryptology-CRYPTO'99, 19th Annual International Cryptology Conference, Lecture Notes in Computer Science 1666, pp. 216-233, Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology-CRYPTO'99, 19th Annual International Cryptology Conference, Lecture Notes in Computer Science 1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
10
-
-
84957643546
-
Differential collisions in SHA-0
-
Springer-Verlag
-
Florent Chabaud and Antoine Joux. Differential Collisions in SHA-0. Advances in Cryptology - CRYPTO'98, 18th Annual International Cryptology Conference, Lecture Notes in Computer Science 1462, pp. 56-71, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology - CRYPTO'98, 18th Annual International Cryptology Conference, Lecture Notes in Computer Science 1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
11
-
-
26444575926
-
A new MAC construction ALRED and a specific instance ALPHA-MAC
-
Springer-Verlag
-
Joan Daemen and Vincent Rijmen. A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. Fast Software Encryption: 12th International Workshop, FSE 2005, Lecture Notes in Computer Science 3557, pp. 1-17, Springer-Verlag, 2005.
-
(2005)
Fast Software Encryption: 12th International Workshop, FSE 2005, Lecture Notes in Computer Science 3557
, pp. 1-17
-
-
Daemen, J.1
Rijmen, V.2
-
16
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
Springer-Verlag
-
Bart Preneel and Paul C. van Oorschot. MDx-MAC and Building Fast MACs from Hash Functions. Advances in Cryptology - CRYPTO'95, 15th Annual International Cryptology Conference, Lecture Notes in Computer Science 963, pp. 1-14, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - CRYPTO'95, 15th Annual International Cryptology Conference, Lecture Notes in Computer Science 963
, pp. 1-14
-
-
Preneel, B.1
Van Oorschot, P.C.2
-
19
-
-
24944575304
-
Crypt-analysis of the hash functions MD4 and RIPEMD
-
Springer-Verlag
-
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu. Crypt-analysis of the Hash Functions MD4 and RIPEMD. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science 3494, pp. 1-18, Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science 3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
20
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Springer-Verlag
-
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding Collisions in the Full SHA-1. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryp-tology Conference, Lecture Notes in Computer Science 3621, pp. 17-36, Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryp-tology Conference, Lecture Notes in Computer Science 3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
21
-
-
24944591357
-
How to break MD5 and other hash functions
-
Springer-Verlag
-
Xiaoyun Wang and Hongbo Yu. How to Break MD5 and Other Hash Functions. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science 3494, pp. 19-35, Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science 3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
22
-
-
33745122987
-
Efficient collision search attacks on SHA-0
-
Springer-Verlag
-
Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin. Efficient Collision Search Attacks on SHA-0. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Lecture Notes in Computer Science 3621, pp. 1-16, Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Lecture Notes in Computer Science 3621
, pp. 1-16
-
-
Wang, X.1
Yu, H.2
Yin, Y.L.3
|