-
1
-
-
38149125029
-
-
Anderson, R., Biham, E.: Tiger: A fast new hash function. In: Gollmann, D. (ed.) FSE'96. LNCS, 1039, pp. 121-144. Springer, Heidelberg (1996)
-
Anderson, R., Biham, E.: Tiger: A fast new hash function. In: Gollmann, D. (ed.) FSE'96. LNCS, vol. 1039, pp. 121-144. Springer, Heidelberg (1996)
-
-
-
-
2
-
-
33746748129
-
-
Hong, D., Chang, D., Sung, J., Lee, S., Hong, S., Lee, J., Moon, D., Chee, S.: A New Dedicated 256-bit Hash Function: FORK-256. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 195-209. Springer, Heidelberg (2006)
-
Hong, D., Chang, D., Sung, J., Lee, S., Hong, S., Lee, J., Moon, D., Chee, S.: A New Dedicated 256-bit Hash Function: FORK-256. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 195-209. Springer, Heidelberg (2006)
-
-
-
-
3
-
-
38149090485
-
A new dedicated 256-bit hash function: FORK-256
-
Hong, D., Sung, J., Hong, S., Lee, S., Moon, D.: A new dedicated 256-bit hash function: FORK-256. In: First NIST Workshop on Hash Functions (2005)
-
(2005)
First NIST Workshop on Hash Functions
-
-
Hong, D.1
Sung, J.2
Hong, S.3
Lee, S.4
Moon, D.5
-
4
-
-
70449098063
-
-
Intel Corporation, manual () Appendix C, Instruction latency and throughput. Available from
-
Intel Corporation. Intel 64 and IA-32 architectures optimization reference manual (2006) Appendix C, Instruction latency and throughput. Available from http://developer.Intel.com/design/processor/manuals/248966.pdf
-
(2006)
Intel 64 and IA-32 architectures optimization reference
-
-
-
5
-
-
35048827899
-
On the additive differential probability of exclusive-or
-
Fast Software Encryption, FSE '04, Springer, Heidelberg
-
Lipmaa, H., Walln, J., Dumas, P.: On the additive differential probability of exclusive-or. In: Fast Software Encryption - FSE '04. LNCS, vol. 3017, pp. 317-331. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3017
, pp. 317-331
-
-
Lipmaa, H.1
Walln, J.2
Dumas, P.3
-
7
-
-
38149100565
-
-
available from
-
Matusiewicz, K., Contini, S., Pieprzyk, J.: Weaknesses of the compression function of FORK-256. IACR e-print Archive, report 2006/317, available from http://eprint.iacr.org/2006/317
-
Weaknesses of the compression function of FORK-256. IACR e-print Archive, report 2006/317
-
-
Matusiewicz, K.1
Contini, S.2
Pieprzyk, J.3
-
8
-
-
84870485362
-
-
Mendel, F., Lano, J., Preneel, B.: Cryptanalysis of reduced variants of the FORK-256 hash function. In: Abe, M. (ed.) CT-RSA 2007. LNCS, 4377, pp. 85-100. Springer, Heidelberg (2006)
-
Mendel, F., Lano, J., Preneel, B.: Cryptanalysis of reduced variants of the FORK-256 hash function. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 85-100. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
38149068476
-
-
Personal communication
-
Muller, F.: Personal communication (2006)
-
(2006)
-
-
Muller, F.1
-
10
-
-
38149138854
-
Secure hash standard (SHS)
-
National Institute of Standards and Technology, April
-
National Institute of Standards and Technology. Secure hash standard (SHS). FIPS 180-1 (April 1995) Replaced by [11].
-
(1995)
Replaced by [11]
, vol.FIPS 180-1
-
-
-
11
-
-
38149072610
-
-
National Institute of Standards and Technology. Secure hash standard (SHS). FIPS 180-2 (August 2002)
-
National Institute of Standards and Technology. Secure hash standard (SHS). FIPS 180-2 (August 2002)
-
-
-
-
12
-
-
38149027899
-
-
Preneel, B., Bosselaers, A., Dobbertin, H.: RIPEMD-160: A strenghtened Version of RIPEMD. In: Gollmann, D. (ed.) FSE'96. LNCS, 1039, pp. 71-82. Springer, Heidelberg (1996)
-
Preneel, B., Bosselaers, A., Dobbertin, H.: RIPEMD-160: A strenghtened Version of RIPEMD. In: Gollmann, D. (ed.) FSE'96. LNCS, vol. 1039, pp. 71-82. Springer, Heidelberg (1996)
-
-
-
-
13
-
-
78650922644
-
The MD4 Message Digest Algorithm
-
Menezes, A.J, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Rivest, R.L.: The MD4 Message Digest Algorithm. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 303-311. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 303-311
-
-
Rivest, R.L.1
-
16
-
-
84958955327
-
-
Schneier, B., Kesley, J.: Unbalanced Feistel networks and block cipher design. In: Gollmann, D. (ed.) FSE'96. LNCS, 1039, pp. 121-144. Springer, Heidelberg (1996)
-
Schneier, B., Kesley, J.: Unbalanced Feistel networks and block cipher design. In: Gollmann, D. (ed.) FSE'96. LNCS, vol. 1039, pp. 121-144. Springer, Heidelberg (1996)
-
-
-
-
17
-
-
24944575304
-
Cryptanalysis of the Hash Functions MD4 and RIPEMD
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
18
-
-
33745171465
-
Finding collisions in the full SHA-I
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-I. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
19
-
-
24944591357
-
How to break MD5 and other hash functions
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
20
-
-
33745122987
-
Efficient collision search attacks on SHA-0
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Wang, X., Yu, H., Yin, Y.L.: Efficient collision search attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 1-16. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 1-16
-
-
Wang, X.1
Yu, H.2
Yin, Y.L.3
-
21
-
-
84985796228
-
-
Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, 718, pp. 83-104. Springer, Heidelberg (1993)
-
Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 83-104. Springer, Heidelberg (1993)
-
-
-
|