메뉴 건너뛰기




Volumn 1039, Issue , 1996, Pages 53-69

Cryptanalysis of MD4

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS;

EID: 84958953847     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-60865-6_43     Document Type: Conference Paper
Times cited : (113)

References (10)
  • 2
    • 5644280926 scopus 로고
    • RIPE, Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE IO4O), Lecture Notes in Computer Science, Springer-Verlag
    • RIPE, Integrity Primitives for Secure Information Systems. Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE IO4O), Lecture Notes in Computer Science, vol. 1007, Springer-Verlag, 1995.
    • (1995) Integrity Primitives for Secure Information Systems , vol.1007
  • 3
    • 85029523925 scopus 로고
    • Advances in Cryptology, CRYPTO '91, Lecture Notes in Computer Science
    • den Boer, В., Bosselaers, A.: An attack on the last two rounds of MD4, Advances in Cryptology, CRYPTO '91, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, 1992, pp. 194-203.
    • (1992) An Attack on the Last Two Rounds of MD4 , vol.576 , pp. 194-203
    • Den Boer, В.1    Bosselaers, A.2
  • 7
    • 0003602325 scopus 로고
    • Request for Comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1
    • Rivest, R.: The MD4 message-digest algorithm, Request for Comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.
    • (1992) The MD4 Message-Digest Algorithm
    • Rivest, R.1
  • 8
    • 0003602325 scopus 로고
    • Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April
    • Rivest, R.: The MD5 message-digest algorithm, Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
    • (1992) The MD5 Message-Digest Algorithm
    • Rivest, R.1
  • 9
    • 84948973102 scopus 로고
    • Fast Software Encryption (Proceedings of the 1994 Leuven Workshop on Cryptographic Algorithms), Lecture Notes in Computer Science
    • Vaudenay, S.: On the need of multipermutations: Cryptanalysis of MB 4 and SAFER, Fast Software Encryption (Proceedings of the 1994 Leuven Workshop on Cryptographic Algorithms), Lecture Notes in Computer Science, vol. 1008, Springer-Verlag, 1995, pp. 286-297.
    • (1995) On the Need of Multipermutations: Cryptanalysis of MB 4 and SAFER , vol.1008 , pp. 286-297
    • Vaudenay, S.1
  • 10
    • 74549196057 scopus 로고
    • How to swindle Rabin
    • Yuval, G.: How to swindle Rabin, Cryptologia, vol. 3, no. 3, 1979, pp. 187-189.
    • (1979) Cryptologia , vol.3 , Issue.3 , pp. 187-189
    • Yuval, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.