-
2
-
-
50449107349
-
Black-box analysis of the blockcipher-based hash function constructions from PGV
-
Advances in Cryptology-Crypto'2002, of, Springer-Verlag
-
J. Black, P. Rogaway, and T. Shrimpton. Black-box analysis of the blockcipher-based hash function constructions from PGV. In Advances in Cryptology-Crypto'2002, volume 2442 of Lecture Notes in Computer Science, pages 320-335. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
3
-
-
0013058662
-
Data authentication using modification detection codes based on a public one way encryption function ,
-
U.S. Patent Number 4,908,861, March 13
-
B. O. Brachtl, D. Coppersmith, M. M. Hyden, S. M. Matyas, C. H.Meyer, J. Oseas, S. Pilpel, and M. Schilling, "Data authentication using modification detection codes based on a public one way encryption function ," U.S. Patent Number 4,908,861, March 13, 1990.
-
(1990)
-
-
Brachtl, B.O.1
Coppersmith, D.2
Hyden, M.M.3
Matyas, S.M.4
Meyer, C.H.5
Oseas, J.6
Pilpel, S.7
Schilling, M.8
-
4
-
-
84985833497
-
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
-
Advances in Cryptology-Auscrypt'1990, of, Springer-Verlag
-
L. Brown, J. Pieprzyk and J. Seberry. LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. In Advances in Cryptology-Auscrypt'1990, volume 453 of Lecture Notes in Computer Science, pages 229-236. Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.453
, pp. 229-236
-
-
Brown, L.1
Pieprzyk, J.2
Seberry, J.3
-
5
-
-
33745119040
-
Merkle-Damgard Revisited: How to Construct a Hash Function
-
Advances in Cryptology-Crypto'2005, of, Springer-Verlag
-
J. S. Coron, Y. Dodis, C.Malinaud and P. Puniya. Merkle-Damgard Revisited: How to Construct a Hash Function. In Advances in Cryptology-Crypto'2005, volume 3621 of Lecture Notes in Computer Science, pages 430-448. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 430-448
-
-
Coron, J.S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
6
-
-
84981199109
-
A design principle for hash functions
-
Advances in Cryptology-Crypto'1989, of, Springer-Verlag
-
I. B. Damgard. A design principle for hash functions. In Advances in Cryptology-Crypto'1989, volume 435 of Lecture Notes in Computer Science, pages 416-427. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 416-427
-
-
Damgard, I.B.1
-
7
-
-
85029454400
-
A construction of a cipher from a single pseudorandom permutation
-
Advances in Cryptology-Asiacrypt'1991, of, Springer-Verlag
-
S. Even, and Y. Mansour. A construction of a cipher from a single pseudorandom permutation. In Advances in Cryptology-Asiacrypt'1991, volume 739 of Lecture Notes in Computer Science, pages 210-224. Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.739
, pp. 210-224
-
-
Even, S.1
Mansour, Y.2
-
8
-
-
24944500380
-
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
-
ICISC'2004, of, Springer-Verlag
-
S. Hirose. Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. In ICISC'2004, volume 3506 of Lecture Notes in Computer Science, pages 330-342. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3506
, pp. 330-342
-
-
Hirose, S.1
-
9
-
-
33750056864
-
Some Plausible Constructions of Double-Block-Length Hash Functions
-
To appear in
-
S. Hirose. Some Plausible Constructions of Double-Block-Length Hash Functions. To appear in proceeding of FSE' 2006.
-
(2006)
proceeding of FSE
-
-
Hirose, S.1
-
10
-
-
0037614498
-
How to protect DES against exhaustive key search
-
Earlier version in CRYPTO' 96
-
J. Kilian, and P. Rogaway. How to protect DES against exhaustive key search. In Journal of Cryptology, 14(1):17-35, 2001, Earlier version in CRYPTO' 96.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.1
, pp. 17-35
-
-
Kilian, J.1
Rogaway, P.2
-
11
-
-
84985820553
-
Hash Functions Based on Block Ciphers
-
Advances in Cryptology-Eurocrypt'1992, of, Springer-Verlag
-
X. Lai and J. L. Massey. Hash Functions Based on Block Ciphers. In Advances in Cryptology-Eurocrypt'1992, volume 658 of Lecture Notes in Computer Science, pages 55-70. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.658
, pp. 55-70
-
-
Lai, X.1
Massey, J.L.2
-
12
-
-
33646776051
-
Failure-Friendly Design Principle for Hash Functions
-
Advances in Cryptology-Asiacrypt'2005, of, Springer-Verlag
-
Stefan Lucks. A Failure-Friendly Design Principle for Hash Functions. In Advances in Cryptology-Asiacrypt'2005, volume 3788 of Lecture Notes in Computer Science, pages 474-494. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 474-494
-
-
Stefan Lucks, A.1
-
13
-
-
35048817517
-
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
-
TCC'2004, of, Springer-Verlag
-
U. Maurer, R. Renner and C. Holenstein. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In TCC'2004, volume 2951 of Lecture Notes in Computer Science, pages 21-39. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 21-39
-
-
Maurer, U.1
Renner, R.2
Holenstein, C.3
-
14
-
-
84937461306
-
One way hash functions and DES
-
Advances in Cryptology-Crypto'1989, of, Springer-Verlag
-
R. C. Merkle. One way hash functions and DES. In Advances in Cryptology-Crypto'1989, volume 435 of Lecture Notes in Computer Science, pages 428-446. Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
15
-
-
33646833289
-
Towards Optimal Double-Length Hash Functions
-
Indocrypt'2005, of, Springer-Verlag
-
Mridul Nandi. Towards Optimal Double-Length Hash Functions. In Indocrypt'2005, volume 3797 of Lecture Notes in Computer Science, pages 77-89. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3797
, pp. 77-89
-
-
Nandi, M.1
-
17
-
-
85026897539
-
Hash Functions based on Block Ciphers : A Synthetic approach
-
Advances in Cryptology-Crypto'1993, of, Springer-Verlag
-
B. Preneel, R. Govaerts and J. Vandewalle. Hash Functions based on Block Ciphers : A Synthetic approach. In Advances in Cryptology-Crypto'1993, volume 773 of Lecture Notes in Computer Science, pages 368-378. Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 368-378
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
18
-
-
84985801328
-
2n-bit Hash Functions Using n-bit Symmetric Block Cipher Algorithms
-
Advances in Cryptology-Eurocrypt'1989, of, Springer-Verlag
-
J. J. Quisquater and M. Girault. 2n-bit Hash Functions Using n-bit Symmetric Block Cipher Algorithms. In Advances in Cryptology-Eurocrypt'1989, volume 434 of Lecture Notes in Computer Science, pages 102-109. Springer-Verlag, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 102-109
-
-
Quisquater, J.J.1
Girault, M.2
-
19
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, 28(4): pages 656-715, 1949.
-
(1949)
Bell Systems Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
|