메뉴 건너뛰기




Volumn 435 LNCS, Issue , 1990, Pages 428-446

One way hash functions and DES

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84937461306     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/0-387-34805-0_40     Document Type: Conference Paper
Times cited : (544)

References (20)
  • 2
    • 0001263548 scopus 로고
    • A Certified Digital Signature
    • unpublished paper
    • “A Certified Digital Signature”, unpublished paper. 1979. To appear in Crypto’ 89.
    • (1979) Crypto’ 89
  • 5
    • 85034664741 scopus 로고    scopus 로고
    • Another Birthday Attack
    • Springer Verlag, Lecture Notes on Computer Science
    • “Another Birthday Attack” by Don Coppersmith, Advances in Cryptology-CRYPTO’ 85. Springer Verlag, Lecture Notes on Computer Science, Vol. 218, pages 14-17.
    • Advances in Cryptology-CRYPTO’ 85 , vol.218 , pp. 14-17
    • Coppersmith, D.1
  • 6
    • 84958802026 scopus 로고    scopus 로고
    • A digital signature based on a conventional encryption function
    • Springer Verlag, Lecture Notes on Computer Science
    • “A digital signature based on a conventional encryption function”. by Ralph C. Merkle, Advances in Cryptology CRYPTO 87, Springer Verlag, Lecture Notes on Computer Science, Vol. 293. page 369–378.
    • Advances in Cryptology CRYPTO 87 , vol.293 , pp. 369-378
    • Merkle, R.C.1
  • 8
    • 0019587141 scopus 로고
    • On the security of multiple encryption
    • July
    • “On the security of multiple encryption”. by Ralph C. Merkle. CACM Vol. 24 No. 7, July 1981 pages 465-467.
    • (1981) CACM , vol.24 , Issue.7 , pp. 465-467
    • Merkle, R.C.1
  • 10
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • Oct
    • “Communication Theory of Secrecy Systems”, by C. E. Shannon, Bell Sys. Tech. Jour. 28 (Oct. 1949) 656–715
    • (1949) Bell Sys. Tech. Jour , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 12
    • 0022029028 scopus 로고
    • Generating strong one-way functions with cryptographic algorithm
    • March
    • “Generating strong one-way functions with cryptographic algorithm”, by S. M. Matyas. C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A. March 1985 pages 5658–5659
    • (1985) IBM Technical Disclosure Bulletin , vol.27 , Issue.10 , pp. 5658-5659
    • Matyas, S.M.1    Meyer, C.H.2    Oseas, J.3
  • 13
    • 85030315851 scopus 로고
    • preliminary version June 9, Analysis of the system presented in [4]
    • “Analysis of Jueneman’s MDC Scheme”. by Don Coppersmith, preliminary version June 9.1988. Analysis of the system presented in [4].
    • (1988) Analysis of Jueneman’s MDC Scheme
    • Coppersmith, D.1
  • 14
    • 0024012695 scopus 로고
    • The Data Encryption Standard: Past and Future
    • May
    • “The Data Encryption Standard: Past and Future” by M.E. Smid and D.K. Branstad, Proc. of the IEEE, Vol 76 No. 5 pp 550–559, May 1988
    • (1988) Proc. of the IEEE , vol.76 , Issue.5 , pp. 550-559
    • Smid, M.E.1    Branstad, D.K.2
  • 15
    • 85032876264 scopus 로고
    • U.S. Congress. Office of Technology Assessment OTA-CIT-310, U.S. Government Printing Office, October
    • “Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information”, U.S. Congress. Office of Technology Assessment OTA-CIT-310, U.S. Government Printing Office, October 1987
    • (1987)
  • 16
    • 0017501281 scopus 로고
    • June
    • “Exhaustive cryptanalysis of the NBS data encryption standard”. Computer, June 1977. pages 74–78
    • (1977) Computer , pp. 74-78
  • 20
    • 85032878183 scopus 로고    scopus 로고
    • Design Principles for Hash Functions
    • “Design Principles for Hash Functions” by Ivan Damgaard. Crypto’ 89.
    • Crypto’ 89
    • Damgaard, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.