메뉴 건너뛰기




Volumn 1294, Issue , 1997, Pages 471-484

Collision-resistant hashing: Towards making UOWHFs practical

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS;

EID: 84958663551     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0052256     Document Type: Conference Paper
Times cited : (139)

References (25)
  • 1
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication. Advances in Cryptology - Crypto 96
    • N. Koblitz ed., Springer-Verlag
    • M. BELLARE, R. CANETTI, AND. H. KRAWCZYK, Keying hash functions for message authentication. Advances in Cryptology - Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996.
    • (1996) Proceedings, Lecture Notes in Computer Science , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 84983089516 scopus 로고
    • The security of cipher block chaining. Advances in Cryptology - Crypto 94
    • Y. Desmedt ed., Springer-Verlag
    • M. BELLARE, J. KILIAN, P. ROGAWAY, The security of cipher block chaining. Advances in Cryptology - Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
    • (1994) Proceedings, Lecture Notes in Computer Science , vol.839
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 6
    • 84958591341 scopus 로고
    • Collision Free Hash Functions and Public Key Signature Schemes. Advances in Cryptology - Eurocrypt 87
    • D. Chaum ed., Springer-Verlag
    • I. DAMG, Collision Free Hash Functions and Public Key Signature Schemes. Advances in Cryptology - Eurocrypt 87 Proceedings, Lecture Notes in Computer Science Vol. 304, D. Chaum ed., Springer-Verlag, 1987.
    • (1987) Proceedings, Lecture Notes in Computer Science , vol.304
    • Damg, I.1
  • 7
    • 84958646325 scopus 로고
    • A Design Principle for Hash Functions. Advances in Cryptology - Crypto 89
    • G. Brassard ed., Springer-Verlag
    • I. DAMG.A Design Principle for Hash Functions. Advances in Cryptology - Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, G. Brassard ed., Springer-Verlag, 1989.
    • (1989) Proceedings, Lecture Notes in Computer Science , vol.435
    • Damg, I.1
  • 8
    • 84958597426 scopus 로고
    • An attack on the last two rounds of MD4. Advances in Cryptology - Crypto 91
    • J. Feigenbaum ed., Springer-Verlag
    • B. DEN BOER, A. BOSSELAERS, An attack on the last two rounds of MD4. Advances in Cryptology - Crypto 91 Proceedings, Lecture Notes in Computer Science Vol. 576, J. Feigenbaum ed., Springer-Verlag, 1991.
    • (1991) Proceedings, Lecture Notes in Computer Science , vol.576
    • Den Boer, B.1    Bosselaers, A.2
  • 9
    • 0001010820 scopus 로고
    • Collisions for the compression function of MD5. Advances in Cryptology - Eurocrype 93
    • T. Helleseth ed., Springer-Verlag
    • S. DEN BOER, A. BOSSELAERS, Collisions for the compression function of MD5. Advances in Cryptology - Eurocrype 93 Proceedings, Lecture Notes in Computer Science Vol. 765, T. Helleseth ed., Springer-Verlag, 1993.
    • (1993) Proceedings, Lecture Notes in Computer Science , vol.765
    • Den Boer, S.1    Bosselaers, A.2
  • 12
    • 84958957924 scopus 로고    scopus 로고
    • RIPEMD-160: A strengthened version of RIPEMD, Fast Software Encryption
    • D. Gollmann, ed., Springer-Verlag
    • H. DOBBERTIN, A. BOSSELAERS, B. PRENEEL, RIPEMD-160: A strengthened version of RIPEMD, Fast Software Encryption, Lecture Notes in Computer Science 1039, D. Gollmann, ed., Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1039
    • Dobbertin, H.1    Bosselaers, A.2    Preneel, B.3
  • 13
    • 0001143795 scopus 로고    scopus 로고
    • Efficient cryptographic schemes provably as secure as subset sum
    • Autumn
    • R. IMPAGLIAZZO, M. NAOR, Efficient cryptographic schemes provably as secure as subset sum. Journal of Cryptology, Vol. 9, No. 4, Autumn 1996.
    • (1996) Journal of Cryptology , vol.9 , Issue.4
    • Impagliazzo, R.1    Naor, M.2
  • 15
    • 0000966673 scopus 로고
    • One way hash functions and DES. Advances in Cryptology - Crypto 89
    • G. Brassard ed., Springer-Verlag
    • R. MERKLE, One way hash functions and DES. Advances in Cryptology - Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, G. Brassard ed., Springer-Verlag, 1989
    • (1989) Proceedings, Lecture Notes in Computer Science , vol.435
    • Merkle, R.1
  • 17
    • 84958619373 scopus 로고
    • FIPS 180-1
    • National Institute of Standards
    • National Institute of Standards, FIPS 180-1, Secure hash standard. April 1995.
    • (1995) Secure Hash Standard
  • 18
    • 84958608752 scopus 로고
    • MD-x MAC and building fast MACs from hash functions. Advances in Cryptology - Crypto 95
    • D. Coppersmith ed., Springer-Verlag
    • B. PRENEEL, P. VAN OORSCHOT, MD-x MAC and building fast MACs from hash functions. Advances in Cryptology - Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
    • (1995) Proceedings, Lecture Notes in Computer Science , vol.963
    • Preneel, B.1    Van Oorschot, P.2
  • 20
    • 78650922644 scopus 로고
    • The MD4 message-digest algorithm, Advances in Cryptology - Crypto 90
    • A. J. Menezes and S. VanstoneSpringer-Verlag, Also IETF RFC 1320 (April 1992)
    • R. RIVEST, The MD4 message-digest algorithm, Advances in Cryptology - Crypto 90 Proceedings, Lecture Notes in Computer Science Vol. 537, A. J. Menezes and S. Vanstone ed., Springer-Verlag, 1990, pp. 303-311. Also IETF RFC 1320 (April 1992).
    • (1990) Proceedings, Lecture Notes in Computer Science , vol.537 , pp. 303-311
    • Rivest, R.1
  • 21
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • R. RIVEST, The MD5 message-digest algorithm. IETF RFC 1321 (April 1992).
    • (1992) IETF RFC , pp. 1321
    • Rivest, R.1
  • 23
    • 0026973508 scopus 로고
    • Message authentication with one-way hash functions
    • IEEE Press
    • G. Tsudik, Message authentication with one-way hash functions, Proceedings of Infocom 92, IEEE Press, 1992.
    • (1992) Proceedings of Infocom 92
    • Tsudik, G.1
  • 24
    • 84948973102 scopus 로고
    • On the need for multipermutations: Cryptanalysis of MD4 and SAFER. Fast Software Encryption -- Leuven Workshop
    • Springer-Verlag
    • S. VAUDENAY, On the need for multipermutations: cryptanalysis of MD4 and SAFER. Fast Software Encryption -- Leuven Workshop, Lecture Notes in Computer Science, vol. 1008 Springer-Verlag, 1995, 286-297.
    • (1995) Lecture Notes in Computer Science , vol.1008 , pp. 286-297
    • Vaudenay, S.1
  • 25
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • WEGMAN, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.