메뉴 건너뛰기




Volumn 1029, Issue , 1996, Pages 201-214

Keyed hash functions

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 77955516185     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (27)

References (17)
  • 1
    • 0012341121 scopus 로고
    • The Classification of Hash Functions
    • (Essex, UK), Institute of Mathematics and its Applications (IMA)
    • R. Anderson, "The Classification of Hash Functions," in Codes and Guphers-Proceedings of Cryptography and Coding IV, (Essex, UK), pp. 83-93, Institute of Mathematics and its Applications (IMA), 1995.
    • (1995) Codes and Guphers-Proceedings of Cryptography and Coding IV , pp. 83-93
    • Anderson, R.1
  • 4
    • 84955568345 scopus 로고
    • Tech. Rep. (included in) SRI-CSL-94-08, SRI International Laboratory, Menlo Park, California, Dec. The revised version (September 2, 1994)
    • T. A. Berson, L. Gong, and T. M. A. Lomas, "Secure, Keyed, and CoUisionful Hash Functions," Tech. Rep. (included in) SRI-CSL-94-08, SRI International Laboratory, Menlo Park, California, Dec. 1993. The revised version (September 2, 1994).
    • (1993) Secure, Keyed, and CoUisionful Hash Functions
    • Berson, T.A.1    Gong, L.2    Lomas, T.M.A.3
  • 8
    • 0023984964 scopus 로고
    • How to Construct Pseudorandom Permutations and Pseudorandom Functions
    • Apr
    • M. Luby and C. RackofF, "How to Construct Pseudorandom Permutations and Pseudorandom Functions," SIAM Journal on Computing, vol. 17, pp. 373-386, Apr. 1988.
    • (1988) SIAM Journal on Computing , vol.17 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 11
    • 0003602325 scopus 로고
    • RFC Apr. 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc
    • R. L. Rivest, "The MD5 Message-Digest Algorithm." RFC 1321, Apr. 1992. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
    • (1992) The MD5 Message-Digest Algorithm
    • Rivest, R.L.1
  • 15
    • 0019572642 scopus 로고
    • New Hash Functions and Their Use in Authentication and Set Equality
    • M. N. Wegman and J. L. Carter, "New Hash Functions and Their Use in Authentication and Set Equality," Journal of Computer and System Sciences, vol. 22, pp. 265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.