-
1
-
-
85029523925
-
An attack on the last two rounds of MD4
-
Springer-Verlag
-
B. den Boer and A. Bosselaers, An attack on the last two rounds of MD4, Advances in Cryptology-Crypto’91, LNCS 576, Springer-Verlag, 1992, pp. 194-203
-
(1992)
Advances in Cryptology-Crypto’91, LNCS 576
, pp. 194-203
-
-
den Boer, B.1
Bosselaers, A.2
-
2
-
-
84985796089
-
Collisions for the compression function of MD5
-
Springer-Verlag
-
B. den Boer and A. Bosselaers, Collisions for the compression function of MD5, Advances in Cryptology-Eurocrypt’93, LNCS 773, Springer-Verlag, 1994, pp. 293-304
-
(1994)
Advances in Cryptology-Eurocrypt’93, LNCS 773
, pp. 293-304
-
-
den Boer, B.1
Bosselaers, A.2
-
3
-
-
84955593890
-
Fast hashing on the Pentium
-
Springer-Verlag
-
A. Bosselaers, R. Govaerts and J. Vandewalle, Fast hashing on the Pentium, Advances in Cryptology-Crypto’96, LNCS 1109, Springer-Verlag, 1996, pp. 298-312
-
(1996)
Advances in Cryptology-Crypto’96, LNCS 1109
, pp. 298-312
-
-
Bosselaers, A.1
Govaerts, R.2
Vandewalle, J.3
-
5
-
-
84957643546
-
Differential collisions in SHA-0
-
Springer-Verlag
-
F. Chabaud and A. Joux, Differential collisions in SHA-0, Advances in Cryptology-Crypto’98, LNCS 1462, Springer-Verlag, 1998, pp. 56-71
-
(1998)
Advances in Cryptology-Crypto’98, LNCS 1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
6
-
-
84981199109
-
A design principle for hash functions
-
Springer-Verlag
-
I. B. Damgård, A design principle for hash functions, Proceedings of Crypto ’89, LNCS 435, Springer-Verlag, 1990, pp. 416-427
-
(1990)
Proceedings of Crypto ’89, LNCS 435
, pp. 416-427
-
-
Damgård, I.B.1
-
8
-
-
0001849866
-
The status of MD5 after a recent attack
-
Sep
-
H. Dobbertin, The status of MD5 after a recent attack, CryptoBytes, 2(2), Sep. 1996, pp. 1-6
-
(1996)
Cryptobytes
, vol.2
, Issue.2
, pp. 1-6
-
-
Dobbertin, H.1
-
9
-
-
84958957924
-
RIPEMD160: A strengthened version of RIPEMD
-
Springer-Verlag, (An updated and corrected version is available at ftp. esat. kuleuven.ac.be/pub/COSIC/bosselae/ripemd/.)
-
H. Dobbertin, A. Bosselaers and B. Preneel, RIPEMD160: A strengthened version of RIPEMD, Fast Software Encryption, LNCS1039, Springer-Verlag, 1996, pp. 71-82. (An updated and corrected version is available at ftp. esat. kuleuven.ac.be/pub/COSIC/bosselae/ripemd/.)
-
(1996)
Fast Software Encryption, LNCS1039
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
10
-
-
33745599342
-
A study on the proposed Korean digital signature algorithm
-
Springer-Verlag
-
C. H. Lim and P. J. Lee, A study on the proposed Korean digital signature algorithm, Advances in Cryptology-Asiacrypt’98, LNCS 1514, Springer-Verlag, 1998, pp. 175-186
-
(1998)
Advances in Cryptology-Asiacrypt’98, LNCS 1514
, pp. 175-186
-
-
Lim, C.H.1
Lee, P.J.2
-
11
-
-
84949306242
-
-
Secure hash standard, FIPS PUB 180-1, Department of Commerce, Washington D. C., Apr
-
NIST, Secure hash standard, FIPS PUB 180-1, Department of Commerce, Washington D. C., Apr. 1995
-
(1995)
-
-
-
15
-
-
0003602325
-
-
RFC 1321, Internet Activities Board, Internet Privacy Task Force, Apr
-
R. Rivest, The MD5 message digest algorithm, RFC 1321, Internet Activities Board, Internet Privacy Task Force, Apr. 1992
-
(1992)
The MD5 Message Digest Algorithm
-
-
Rivest, R.1
-
16
-
-
85028888814
-
Highly nonlinear 0-1 balanced boolean functions satisfying strict avalanche criterion
-
Springer-Verlag
-
J. Seberry and X. M. Zhang, Highly nonlinear 0-1 balanced boolean functions satisfying strict avalanche criterion, Advances in Cryptology-Auscrypt’92, LNCS 718, Springer-Verlag, 1993, pp. 145-154
-
(1993)
Advances in Cryptology-Auscrypt’92, LNCS 718
, pp. 145-154
-
-
Seberry, J.1
Zhang, X.M.2
-
17
-
-
0012473975
-
Nonlinearity and propagation characteristics of balanced boolean functions
-
J. Seberry, X. M. Zhang and Y. Zheng, Nonlinearity and propagation characteristics of balanced boolean functions, Information and Computation, 119, 1995, pp. 1-13
-
(1995)
Information and Computation
, vol.119
, pp. 1-13
-
-
Seberry, J.1
Zhang, X.M.2
Zheng, Y.3
-
18
-
-
74549196057
-
How to swindle Rabin
-
G. Yuval, How to swindle Rabin, Cryptologia, Vol. 3, No. 3, 1979, pp. 187-189
-
(1979)
Cryptologia
, vol.3
, Issue.3
, pp. 187-189
-
-
Yuval, G.1
-
19
-
-
84985796228
-
HAVAL -A one-way hashing algorithm with variable length of output
-
Springer-Verlag
-
Y. Zheng, J. Pieprzyk and J. Sebberry, HAVAL -A one-way hashing algorithm with variable length of output, Advances in Cryptology-Auscrypt’92, LNCS 718, Springer-Verlag, 1993, pp. 83-104
-
(1993)
Advances in Cryptology-Auscrypt’92, LNCS 718
, pp. 83-104
-
-
Zheng, Y.1
Pieprzyk, J.2
Sebberry, J.3
|