-
1
-
-
35048891868
-
Keying hash functions for message authentication. Advances in Cryptology - Crypto 96
-
N. Koblitz ed., Springer-Verlag
-
M. BELLARE, R. CANETTI, AND. H. KRAWCZYK, Keying hash functions for message authentication. Advances in Cryptology - Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996.
-
(1996)
Proceedings, Lecture Notes in Computer Science
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
84983089516
-
The security of cipher block chaining. Advances in Cryptology - Crypto 94
-
Y. Desmedt ed., Springer-Verlag
-
M. BELLARE, J. KILIAN, P. ROGAWAY, The security of cipher block chaining. Advances in Cryptology - Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
-
(1994)
Proceedings, Lecture Notes in Computer Science
, vol.839
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
6
-
-
84958591341
-
Collision Free Hash Functions and Public Key Signature Schemes. Advances in Cryptology - Eurocrypt 87
-
D. Chaum ed., Springer-Verlag
-
I. DAMG, Collision Free Hash Functions and Public Key Signature Schemes. Advances in Cryptology - Eurocrypt 87 Proceedings, Lecture Notes in Computer Science Vol. 304, D. Chaum ed., Springer-Verlag, 1987.
-
(1987)
Proceedings, Lecture Notes in Computer Science
, vol.304
-
-
Damg, I.1
-
7
-
-
84958646325
-
A Design Principle for Hash Functions. Advances in Cryptology - Crypto 89
-
G. Brassard ed., Springer-Verlag
-
I. DAMG.A Design Principle for Hash Functions. Advances in Cryptology - Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, G. Brassard ed., Springer-Verlag, 1989.
-
(1989)
Proceedings, Lecture Notes in Computer Science
, vol.435
-
-
Damg, I.1
-
8
-
-
84958597426
-
An attack on the last two rounds of MD4. Advances in Cryptology - Crypto 91
-
J. Feigenbaum ed., Springer-Verlag
-
B. DEN BOER, A. BOSSELAERS, An attack on the last two rounds of MD4. Advances in Cryptology - Crypto 91 Proceedings, Lecture Notes in Computer Science Vol. 576, J. Feigenbaum ed., Springer-Verlag, 1991.
-
(1991)
Proceedings, Lecture Notes in Computer Science
, vol.576
-
-
Den Boer, B.1
Bosselaers, A.2
-
9
-
-
0001010820
-
Collisions for the compression function of MD5. Advances in Cryptology - Eurocrype 93
-
T. Helleseth ed., Springer-Verlag
-
S. DEN BOER, A. BOSSELAERS, Collisions for the compression function of MD5. Advances in Cryptology - Eurocrype 93 Proceedings, Lecture Notes in Computer Science Vol. 765, T. Helleseth ed., Springer-Verlag, 1993.
-
(1993)
Proceedings, Lecture Notes in Computer Science
, vol.765
-
-
Den Boer, S.1
Bosselaers, A.2
-
10
-
-
84958675804
-
-
D. Gollman, ed.,Springer-Verlag
-
H. DOBBERTIN, Cryptanaiysis of MD4. Fast Software Encryption--Cambridge Workshop, Lecture Notes in Computer Science, vol. 1039, D. Gollman, ed.,Springer-Verlag, 1996.
-
(1996)
Cryptanaiysis of MD4. Fast Software Encryption--Cambridge Workshop, Lecture Notes in Computer Science
, vol.1039
-
-
Dobbertin, H.1
-
12
-
-
84958957924
-
RIPEMD-160: A strengthened version of RIPEMD, Fast Software Encryption
-
D. Gollmann, ed., Springer-Verlag
-
H. DOBBERTIN, A. BOSSELAERS, B. PRENEEL, RIPEMD-160: A strengthened version of RIPEMD, Fast Software Encryption, Lecture Notes in Computer Science 1039, D. Gollmann, ed., Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1039
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
13
-
-
0001143795
-
Efficient cryptographic schemes provably as secure as subset sum
-
Autumn
-
R. IMPAGLIAZZO, M. NAOR, Efficient cryptographic schemes provably as secure as subset sum. Journal of Cryptology, Vol. 9, No. 4, Autumn 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.4
-
-
Impagliazzo, R.1
Naor, M.2
-
15
-
-
0000966673
-
One way hash functions and DES. Advances in Cryptology - Crypto 89
-
G. Brassard ed., Springer-Verlag
-
R. MERKLE, One way hash functions and DES. Advances in Cryptology - Crypto 89 Proceedings, Lecture Notes in Computer Science Vol. 435, G. Brassard ed., Springer-Verlag, 1989
-
(1989)
Proceedings, Lecture Notes in Computer Science
, vol.435
-
-
Merkle, R.1
-
17
-
-
84958619373
-
FIPS 180-1
-
National Institute of Standards
-
National Institute of Standards, FIPS 180-1, Secure hash standard. April 1995.
-
(1995)
Secure Hash Standard
-
-
-
18
-
-
84958608752
-
MD-x MAC and building fast MACs from hash functions. Advances in Cryptology - Crypto 95
-
D. Coppersmith ed., Springer-Verlag
-
B. PRENEEL, P. VAN OORSCHOT, MD-x MAC and building fast MACs from hash functions. Advances in Cryptology - Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995.
-
(1995)
Proceedings, Lecture Notes in Computer Science
, vol.963
-
-
Preneel, B.1
Van Oorschot, P.2
-
20
-
-
78650922644
-
The MD4 message-digest algorithm, Advances in Cryptology - Crypto 90
-
A. J. Menezes and S. VanstoneSpringer-Verlag, Also IETF RFC 1320 (April 1992)
-
R. RIVEST, The MD4 message-digest algorithm, Advances in Cryptology - Crypto 90 Proceedings, Lecture Notes in Computer Science Vol. 537, A. J. Menezes and S. Vanstone ed., Springer-Verlag, 1990, pp. 303-311. Also IETF RFC 1320 (April 1992).
-
(1990)
Proceedings, Lecture Notes in Computer Science
, vol.537
, pp. 303-311
-
-
Rivest, R.1
-
21
-
-
0003195066
-
The MD5 message-digest algorithm
-
R. RIVEST, The MD5 message-digest algorithm. IETF RFC 1321 (April 1992).
-
(1992)
IETF RFC
, pp. 1321
-
-
Rivest, R.1
-
23
-
-
0026973508
-
Message authentication with one-way hash functions
-
IEEE Press
-
G. Tsudik, Message authentication with one-way hash functions, Proceedings of Infocom 92, IEEE Press, 1992.
-
(1992)
Proceedings of Infocom 92
-
-
Tsudik, G.1
-
24
-
-
84948973102
-
On the need for multipermutations: Cryptanalysis of MD4 and SAFER. Fast Software Encryption -- Leuven Workshop
-
Springer-Verlag
-
S. VAUDENAY, On the need for multipermutations: cryptanalysis of MD4 and SAFER. Fast Software Encryption -- Leuven Workshop, Lecture Notes in Computer Science, vol. 1008 Springer-Verlag, 1995, 286-297.
-
(1995)
Lecture Notes in Computer Science
, vol.1008
, pp. 286-297
-
-
Vaudenay, S.1
-
25
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
WEGMAN, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, Vol. 22, 1981, pp. 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman1
|