-
1
-
-
0012341121
-
The Classification of Hash Functions
-
(Essex, UK), Institute of Mathematics and its Applications (IMA)
-
R. Anderson, "The Classification of Hash Functions," in Codes and Guphers-Proceedings of Cryptography and Coding IV, (Essex, UK), pp. 83-93, Institute of Mathematics and its Applications (IMA), 1995.
-
(1995)
Codes and Guphers-Proceedings of Cryptography and Coding IV
, pp. 83-93
-
-
Anderson, R.1
-
2
-
-
0005314588
-
-
Tech. Rep. 95-09, Department of Computer Science, University of Wollongong, July
-
S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, "Cryptographic Hash Functions: A Survey," Tech. Rep. 95-09, Department of Computer Science, University of Wollongong, July 1995.
-
(1995)
Cryptographic Hash Functions: A Survey
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
3
-
-
84955591686
-
Practical and Secure Message Authentication
-
(Ottawa, Canada), May
-
S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk, "Practical and Secure Message Authentication," in Series of Annual Workshop on Selected Areas in Cryptography (SAC '95), (Ottawa, Canada), pp. 55-68, May 1995.
-
(1995)
Series of Annual Workshop on Selected Areas in Cryptography (SAC '95)
, pp. 55-68
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
4
-
-
84955568345
-
-
Tech. Rep. (included in) SRI-CSL-94-08, SRI International Laboratory, Menlo Park, California, Dec. The revised version (September 2, 1994)
-
T. A. Berson, L. Gong, and T. M. A. Lomas, "Secure, Keyed, and CoUisionful Hash Functions," Tech. Rep. (included in) SRI-CSL-94-08, SRI International Laboratory, Menlo Park, California, Dec. 1993. The revised version (September 2, 1994).
-
(1993)
Secure, Keyed, and CoUisionful Hash Functions
-
-
Berson, T.A.1
Gong, L.2
Lomas, T.M.A.3
-
5
-
-
0018456171
-
Universal Class of Hash Functions
-
J. L. Carter and M. N. Wegman, "Universal Class of Hash Functions," Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143-154, 1979.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
8
-
-
0023984964
-
How to Construct Pseudorandom Permutations and Pseudorandom Functions
-
Apr
-
M. Luby and C. RackofF, "How to Construct Pseudorandom Permutations and Pseudorandom Functions," SIAM Journal on Computing, vol. 17, pp. 373-386, Apr. 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
11
-
-
0003602325
-
-
RFC Apr. 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc
-
R. L. Rivest, "The MD5 Message-Digest Algorithm." RFC 1321, Apr. 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
-
(1992)
The MD5 Message-Digest Algorithm
-
-
Rivest, R.L.1
-
12
-
-
84955613706
-
Combinatorial Characterization of A-Codes with r-Fold Security
-
Springer-Verlag
-
R. Safavi-Naini and L. Tombak, "Combinatorial Characterization of A-Codes with r-Fold Security," in Advances in Cryptology, Proceedings of ASIACRYPT '94, vol. 917 of Lecture Notes in Computer Science (LNCS), pp. 211-223, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology, Proceedings of ASIACRYPT '94, vol. 917 of Lecture Notes in Computer Science (LNCS)
, pp. 211-223
-
-
Safavi-Naini, R.1
Tombak, L.2
-
13
-
-
84983269168
-
Authentication Theory/Coding Theory
-
Springer-Verlag
-
G. J. Simmons, "Authentication Theory/Coding Theory," in Advances in Cryptology, Proceedings of CRYPTO '84, vol. 196 of Lecture Notes in Computer Science (LNCS), pp. 411-431, Springer-Verlag, 1985.
-
(1985)
Advances in Cryptology, Proceedings of CRYPTO '84, vol. 196 of Lecture Notes in Computer Science (LNCS)
, pp. 411-431
-
-
Simmons, G.J.1
-
15
-
-
0019572642
-
New Hash Functions and Their Use in Authentication and Set Equality
-
M. N. Wegman and J. L. Carter, "New Hash Functions and Their Use in Authentication and Set Equality," Journal of Computer and System Sciences, vol. 22, pp. 265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
17
-
-
84985796228
-
HAVAL-A One-Way Hashing Algorithm with Variable Length of Output
-
(Queensland, Australia), Springer-Verlag, Dec
-
Y. Zheng, J. Pieprzyk, and J. Seberry, "HAVAL-A One-Way Hashing Algorithm with Variable Length of Output," in Advances in Cryptology, Proceedings of AUSCRYPT '92, vol. 718 of Lecture Notes in Computer Science (LNCS), (Queensland, Australia), pp. 83-104, Springer-Verlag, Dec. 1992.
-
(1992)
Advances in Cryptology, Proceedings of AUSCRYPT '92, vol. 718 of Lecture Notes in Computer Science (LNCS)
, pp. 83-104
-
-
Zheng, Y.1
Pieprzyk, J.2
Seberry, J.3
|