-
1
-
-
0036713329
-
Random codes: Minimum distances and error exponents
-
DOI 10.1109/TIT.2002.800480, PII 1011092002800480
-
A. Barg G.D. Forney Jr. 2002 Random codes: minimum distances and error exponents IEEE Trans. Inf. Theory 48 9 2568 2573 10.1109/TIT.2002.800480 1062.94005 1929465 (Pubitemid 35032681)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2568-2573
-
-
Barg, A.1
Forney Jr., G.D.2
-
2
-
-
0040553594
-
An improved Monte Carlo factorization algorithm
-
10.1007/BF01933190 0439.65001 583032
-
R.P. Brent 1980 An improved Monte Carlo factorization algorithm BIT 20 2 176 184 10.1007/BF01933190 0439.65001 583032
-
(1980)
BIT
, vol.20
, Issue.2
, pp. 176-184
-
-
Brent, R.P.1
-
3
-
-
38049123011
-
Amplifying collision resistance: A complexity-theoretic treatment
-
A. Menezes (eds). Springer Heidelberg
-
Canetti R., Rivest R.L., Sudan M., Trevisan L., Vadhan S.P., Wee H.: Amplifying collision resistance: a complexity-theoretic treatment. In: Menezes, A. (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 4622, pp. 264-283. Springer, Heidelberg (2007)
-
(2007)
CRYPTO, Lecture Notes in Computer Science, Vol. 4622
, pp. 264-283
-
-
Canetti, R.1
Rivest, R.L.2
Sudan, M.3
Trevisan, L.4
Vadhan, S.P.5
Wee, H.6
-
4
-
-
0004222925
-
-
North-Holland Publishing Co. Amsterdam
-
Cohen G., Honkala I., Litsyn S., Lobstein A.: Covering codes, vol. 54 of North-Holland Mathematical Library. North-Holland Publishing Co., Amsterdam (1997)
-
(1997)
Covering Codes, Vol. 54 of North-Holland Mathematical Library
-
-
Cohen, G.1
Honkala, I.2
Litsyn, S.3
Lobstein, A.4
-
5
-
-
23044441343
-
-
Chapman & Hall/CRC, Boca Raton, FL
-
Cohen H., Frey G., Avanzi R., Doche C., Lange T., Nguyen K., Vercauteren F. (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography. Discrete Mathematics and its Applications (Boca Raton). Chapman & Hall/CRC, Boca Raton, FL (2006).
-
(2006)
Handbook of Elliptic and Hyperelliptic Curve Cryptography. Discrete Mathematics and Its Applications (Boca Raton)
-
-
Cohen, H.1
Frey, G.2
Avanzi, R.3
Doche, C.4
Lange, T.5
Nguyen, K.6
Vercauteren, F.7
-
6
-
-
84981199109
-
A design principle for hash functions
-
G. Brassard (eds). Springer Heidelberg
-
Damgård I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 435, pp. 416-427. Springer, Heidelberg (1989)
-
(1989)
CRYPTO, Lecture Notes in Computer Science, Vol. 435
, pp. 416-427
-
-
Damgård, I.1
-
7
-
-
84985796089
-
Collisions for the compression function of MD5
-
G. Goos J. Hartmanis (eds). Springer Heidelberg
-
den Boer B., Bosselaers A.: Collisions for the compression function of MD5. In: Goos, G., Hartmanis, J. (eds) EUROCRYPT, Lecture Notes in Computer Science, vol. 765, pp. 293-304. Springer, Heidelberg (1993)
-
(1993)
EUROCRYPT, Lecture Notes in Computer Science, Vol. 765
, pp. 293-304
-
-
Den Boer, B.1
Bosselaers, A.2
-
8
-
-
77949530882
-
Optimal hash functions for approximate matches on the n-cube
-
10.1109/TIT.2009.2039037 2723654
-
D. Gordon V. Miller P. Ostapenko 2010 Optimal hash functions for approximate matches on the n-cube IEEE Trans. Inform. Theory 56 3 984 991 10.1109/TIT.2009.2039037 2723654
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.3
, pp. 984-991
-
-
Gordon, D.1
Miller, V.2
Ostapenko, P.3
-
9
-
-
0022054679
-
On the covering radius of codes
-
10.1109/TIT.1985.1057039 0585.94012 794436
-
R.L. Graham N.J.A. Sloane 1985 On the covering radius of codes IEEE Trans. Inform. Theory 31 3 385 401 10.1109/TIT.1985.1057039 0585.94012 794436
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, Issue.3
, pp. 385-401
-
-
Graham, R.L.1
Sloane, N.J.A.2
-
10
-
-
0000702490
-
Probability distributions related to random mappings
-
10.1214/aoms/1177705677 0158.34905
-
B. Harris 1960 Probability distributions related to random mappings Ann. Math. Stat. 31 1045 1062 10.1214/aoms/1177705677 0158.34905
-
(1960)
Ann. Math. Stat.
, vol.31
, pp. 1045-1062
-
-
Harris, B.1
-
12
-
-
0003657590
-
-
third edn. Addison-Wesley Publishing Co., Reading, MA
-
Knuth D.E.: The art of computer programming. Seminumerical algorithms, Addison-Wesley Series in Computer Science and Information Processing, vol. 2, third edn. Addison-Wesley Publishing Co., Reading, MA, (1997).
-
(1997)
The Art of Computer Programming. Seminumerical Algorithms, Addison-Wesley Series in Computer Science and Information Processing
, vol.2
-
-
Knuth, D.E.1
-
13
-
-
0022029028
-
Generating strong one-way functions with crypographic algorithm
-
S.M. Matyas C.H. Meyer J. Oseas 1985 Generating strong one-way functions with crypographic algorithm IBM Tech. Discl. Bull. 27 10A 5658 5659
-
(1985)
IBM Tech. Discl. Bull.
, vol.27
, Issue.10
, pp. 5658-5659
-
-
Matyas, S.M.1
Meyer, C.H.2
Oseas, J.3
-
14
-
-
70350426602
-
On free-start collisions and collisions for TIB3
-
Samarati P., Yung M., Martinelli F., Ardagna C.A. (ed) Springer, Heidelberg
-
Mendel F., Schläffer M.: On free-start collisions and collisions for TIB3. In: Samarati P., Yung M., Martinelli F., Ardagna C.A. (ed) ISC, Lecture Notes in Computer Science, vol. 5735, pp. 95-106. Springer, Heidelberg (2009).
-
(2009)
ISC, Lecture Notes in Computer Science
, vol.5735
, pp. 95-106
-
-
Mendel, F.1
-
16
-
-
84937461306
-
One way hash functions and des
-
Brassard G. (ed.) Springer, Heidelberg
-
Merkle R.C.: One way hash functions and DES. In: Brassard G. (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 435, pp. 428-446. Springer, Heidelberg (1989).
-
(1989)
CRYPTO, Lecture Notes in Computer Science
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
20
-
-
1842610602
-
Cycle detection using a stack
-
10.1016/j.ipl.2004.01.016 1178.68648 2052030
-
G. Nivasch 2004 Cycle detection using a stack Inf. Process. Lett. 90 3 135 140 10.1016/j.ipl.2004.01.016 1178.68648 2052030
-
(2004)
Inf. Process. Lett.
, vol.90
, Issue.3
, pp. 135-140
-
-
Nivasch, G.1
-
22
-
-
84966238549
-
Monte Carlo methods for index computation (mod p)
-
0382.10001 491431
-
J.M. Pollard 1978 Monte Carlo methods for index computation (mod p) Math. Comp. 32 143 918 924 0382.10001 491431
-
(1978)
Math. Comp.
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
23
-
-
50049107054
-
How easy is collision search. new results and applications to des
-
Brassard G. (ed.) Springer, Heidelberg
-
Quisquater J.-J., Delescaille J.-P.: How easy is collision search. new results and applications to DES. In: Brassard G. (ed.) CRYPTO Lecture Notes in Computer Science, vol. 435, pp. 408-413. Springer, Heidelberg (1989).
-
(1989)
CRYPTO Lecture Notes in Computer Science
, vol.435
, pp. 408-413
-
-
Quisquater, J.-J.1
Delescaille, J.-P.2
-
25
-
-
0028462216
-
An improvement of the Van Wee bound for binary linear covering codes
-
10.1109/18.335936 0813.94023 1301433
-
R. Struik 1994 An improvement of the Van Wee bound for binary linear covering codes IEEE Trans. Inform. Theory 40 4 1280 1284 10.1109/18.335936 0813.94023 1301433
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, Issue.4
, pp. 1280-1284
-
-
Struik, R.1
-
26
-
-
84955586695
-
Improving implementable meet-in-The-middle attacks by orders of magnitude
-
Advances in Cryptology - CRYPTO '96
-
van Oorschot P.C., Wiener M.J.: Improving implementable meet-in-the-middle attacks by orders of magnitude. In: Koblitz N. (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 1109, pp. 229-236. Springer, Heidelberg (1996). (Pubitemid 126106243)
-
(1996)
Lecture Notes in Computer Science
, Issue.1109
, pp. 229-236
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
27
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
10.1007/PL00003816 0992.94028
-
P.C. van Oorschot M.J. Wiener 1999 Parallel collision search with cryptanalytic applications J. Cryptol. 12 1 1 28 10.1007/PL00003816 0992.94028
-
(1999)
J. Cryptol.
, vol.12
, Issue.1
, pp. 1-28
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
28
-
-
0023981711
-
Improved sphere bounds on the covering radius of codes
-
DOI 10.1109/18.2632
-
G.J.M. van Wee 1988 Improved sphere bounds on the covering radius of codes IEEE Trans. Inform. Theory 34 2 237 245 10.1109/18.2632 0653.94014 945316 (Pubitemid 18639976)
-
(1988)
IEEE Transactions on Information Theory
, vol.34
, Issue.2
, pp. 237-245
-
-
Van Wee Gerhard, J.M.1
-
29
-
-
24944591357
-
How to break MD5 and other hash functions
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Wang X., Yu H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT, Lecture Notes in Computer Science, vol. 3494, pp. 19-35. Springer, Heidelberg (2005) (Pubitemid 41313944)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
30
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Wang X., Yin Y.L., Yu H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 3621, pp. 17-36. Springer, Heidelberg (2005) (Pubitemid 43902104)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
31
-
-
84950781609
-
How to swindle Rabin?
-
10.1080/0161-117991854025
-
G. Yuval 1979 How to swindle Rabin? Cryptologia 3 3 187 191 10.1080/0161-117991854025
-
(1979)
Cryptologia
, vol.3
, Issue.3
, pp. 187-191
-
-
Yuval, G.1
|