-
1
-
-
84983089516
-
The security of cipher block chaining
-
Springer-Verlag
-
M. Bellare, J. Kilian, P. Rogaway, "The security of cipher block chaining," Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, pp. 341-358.
-
(1994)
Proc. Crypto'94, LNCS 839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
2
-
-
84887300122
-
XOR MACs: New methods for message authentication using block ciphers
-
(this volume)
-
M. Bellare, R. Guérin, P. Rogaway, "XOR MACs: new methods for message authentication using block ciphers," Proc. Crypto'95 (this volume).
-
Proc. Crypto'95
-
-
Bellare, M.1
Guérin, R.2
Rogaway, P.3
-
3
-
-
27544455677
-
A cryptographic checksum for integrity protection
-
F. Cohen, "A cryptographic checksum for integrity protection," Computers & Security, Vol. 6, No. 5, 1987, pp. 505-510.
-
(1987)
Computers & Security
, vol.6
, Issue.5
, pp. 505-510
-
-
Cohen, F.1
-
4
-
-
84981199109
-
A design principle for hash functions
-
Springer-Verlag
-
I.B. Damgård, "A design principle for hash functions," Proc. Crypto'89, LNCS 435, Springer-Verlag, 1990, pp. 416-427.
-
(1990)
Proc. Crypto'89, LNCS 435
, pp. 416-427
-
-
Damgård, I.B.1
-
5
-
-
84985785183
-
A message authenticator algorithm suitable for a mainframe computer
-
Springer-Verlag
-
D. Davies, "A message authenticator algorithm suitable for a mainframe computer," Proc. Crypto'84, LNCS 196, Springer-Verlag, 1985, pp. 393-400.
-
(1985)
Proc. Crypto'84, LNCS 196
, pp. 393-400
-
-
Davies, D.1
-
6
-
-
78649262413
-
The message authenticator algorithm (MAA) and its implementation
-
Feb
-
D. Davies, D.O. Clayden, "The message authenticator algorithm (MAA) and its implementation," NPL Report DITC 109/88, Feb. 1988.
-
(1988)
NPL Report DITC 109/88
-
-
Davies, D.1
Clayden, D.O.2
-
8
-
-
85029523925
-
An attack on the last two rounds of MD4
-
Springer-Verlag
-
B. den Boer, A. Bosselaers, "An attack on the last two rounds of MD4," Proc. Crypto'91, LNCS 576, Springer-Verlag, 1992, pp. 194-203.
-
(1992)
Proc. Crypto'91, LNCS 576
, pp. 194-203
-
-
den Boer, B.1
Bosselaers, A.2
-
9
-
-
84985796089
-
Collisions for the compression function of MD5
-
Springer-Verlag
-
B. den Boer, A. Bosselaers, "Collisions for the compression function of MD5," Proc. Eurocrypt'93, LNCS 765, Springer-Verlag, 1994, pp. 293-304.
-
(1994)
Proc. Eurocrypt'93, LNCS 765
, pp. 293-304
-
-
den Boer, B.1
Bosselaers, A.2
-
10
-
-
0003508568
-
-
NBS, U.S. Department of Commerce, Washington D.C., Jan
-
FIPS 46, Data encryption standard, NBS, U.S. Department of Commerce, Washington D.C., Jan. 1977.
-
(1977)
Data encryption standard
-
-
FIPS 461
-
11
-
-
0004246335
-
-
NBS, US Department of Commerce, Washington D. C., Dec
-
FIPS 81, DES modes of operation, NBS, US Department of Commerce, Washington D. C., Dec. 1980.
-
(1980)
DES modes of operation
-
-
FIPS 811
-
12
-
-
0003629991
-
-
NIST, US Department of Commerce, Washington D.C., April
-
FIPS 180-1, Secure hash standard, NIST, US Department of Commerce, Washington D.C., April 1995.
-
(1995)
Secure hash standard
-
-
FIPS 180-11
-
13
-
-
67650674871
-
Secure management of SNMP networks
-
North Holland
-
J.M. Galvin, K. McCloghrie, J.R. Davin, "Secure management of SNMP networks," Integrated Network Management, II, North Holland, 1991, pp. 703-714.
-
(1991)
Integrated Network Management, II
, pp. 703-714
-
-
Galvin, J.M.1
McCloghrie, K.2
Davin, J.R.3
-
14
-
-
84957610593
-
Banking - Approved algorithms for message authentication, Part 1, DEA, IS 8731-1
-
IS 8731-2
-
ISO 8731:1987, Banking - approved algorithms for message authentication, Part 1, DEA, IS 8731-1, Part 2, Message Authentication Algorithm (MAA), IS 8731-2.
-
(1987)
Part 2, Message Authentication Algorithm (MAA)
-
-
ISO 87311
-
16
-
-
84878363139
-
On the relation between A-codes and codes correcting independent errors
-
Springer- Verlag
-
T. Johansson, G. Kabatianskii, B. Smeets, "On the relation between A-codes and codes correcting independent errors," Proc. Eurocrypt'93, LNCS 765, Springer- Verlag, 1994, pp. 1-11.
-
(1994)
Proc. Eurocrypt'93, LNCS 765
, pp. 1-11
-
-
Johansson, T.1
Kabatianskii, G.2
Smeets, B.3
-
17
-
-
0020923149
-
Message authentication with Manipulation Detection Codes
-
IEEE Computer Society Press
-
R.R. Jueneman, S.M. Matyas, C.H. Meyer, "Message authentication with Manipulation Detection Codes," Proc. 1983 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1983, pp. 33-54.
-
(1983)
Proc. 1983 IEEE Symposium on Security and Privacy
, pp. 33-54
-
-
Jueneman, R.R.1
Matyas, S.M.2
Meyer, C.H.3
-
18
-
-
0006595839
-
Message authentication with MD5
-
Spring
-
B. Kaliski, M. Robshaw, "Message authentication with MD5," CryptoBytes (RSA Laboratories Technical Newsletter), Vol. 1, No. 1, Spring 1995, pp. 5-8.
-
(1995)
CryptoBytes (RSA Laboratories Technical Newsletter)
, vol.1
, Issue.1
, pp. 5-8
-
-
Kaliski, B.1
Robshaw, M.2
-
19
-
-
84991939136
-
LFSR-based hashing and authentication
-
Springer-Verlag
-
H. Krawczyk, "LFSR-based hashing and authentication," Proc. Crypto'94, LNCS 839, Springer-Verlag, 1994, pp. 129-139.
-
(1994)
Proc. Crypto'94, LNCS 839
, pp. 129-139
-
-
Krawczyk, H.1
-
20
-
-
84957613606
-
The Kerberos Version 5 GSS-API Mechanism
-
Feb
-
J. Linn, "The Kerberos Version 5 GSS-API Mechanism," Internet Draft, Feb. 1995.
-
(1995)
Internet Draft
-
-
Linn, J.1
-
21
-
-
50849147684
-
Solutions to the multidestination secure electronic mail problem
-
C. Mitchell, M. Walker, "Solutions to the multidestination secure electronic mail problem," Computers & Security, Vol. 7, No. 5, 1988, pp. 483-488.
-
(1988)
Computers & Security
, vol.7
, Issue.5
, pp. 483-488
-
-
Mitchell, C.1
Walker, M.2
-
24
-
-
78650922644
-
The MD4 message digest algorithm
-
Springer-Verlag
-
R.L. Rivest, "The MD4 message digest algorithm," Proc. Crypto'90, LNCS 537, Springer-Verlag, 1991, pp. 303-311.
-
(1991)
Proc. Crypto'90, LNCS 537
, pp. 303-311
-
-
Rivest, R.L.1
-
25
-
-
0003195066
-
The MD5 message-digest algorithm
-
Internet Activities Board, Internet Privacy Task Force, April
-
R.L. Rivest, "The MD5 message-digest algorithm," Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
-
(1992)
Request for Comments (RFC) 1321
-
-
Rivest, R.L.1
-
26
-
-
0347506735
-
Message authentication with one-way hash functions
-
G. Tsudik, "Message authentication with one-way hash functions," ACM Computer Communications Review, Vol. 22, No. 5, 1992, pp. 29-38.
-
(1992)
ACM Computer Communications Review
, vol.22
, Issue.5
, pp. 29-38
-
-
Tsudik, G.1
-
27
-
-
84948973102
-
On the need for multipermutations: Cryptanalysis of MD4 and SAFER
-
Springer-Verlag, (to appear)
-
S. Vaudenay, "On the need for multipermutations: cryptanalysis of MD4 and SAFER," Fast Software Encryption, LNCS, Springer-Verlag, 1995 (to appear).
-
(1995)
Fast Software Encryption, LNCS
-
-
Vaudenay, S.1
-
28
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M.N. Wegman, J.L. Carter, "New hash functions and their use in authentication and set equality," J. Computer Sys. Sciences, Vol. 22, No. 3, 1981, pp. 265-279.
-
(1981)
J. Computer Sys. Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
29
-
-
1842531284
-
-
Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May. Presented at the rump session of Crypto'93
-
M. J. Wiener, "Efficient DES key search," Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994. Presented at the rump session of Crypto'93.
-
(1994)
Efficient DES key search
-
-
Wiener, M.J.1
|