-
1
-
-
0003629991
-
-
FIPS 180-1, NIST, US Department of Commerce, Washington D.C., April
-
FIPS 180-1, Secure hash standard, Federal Information Processing Standard, NIST, US Department of Commerce, Washington D.C., April 1995.
-
(1995)
Secure Hash Standard, Federal Information Processing Standard
-
-
-
2
-
-
5644280926
-
-
RIPE, Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE IO4O), Lecture Notes in Computer Science, Springer-Verlag
-
RIPE, Integrity Primitives for Secure Information Systems. Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE IO4O), Lecture Notes in Computer Science, vol. 1007, Springer-Verlag, 1995.
-
(1995)
Integrity Primitives for Secure Information Systems
, vol.1007
-
-
-
3
-
-
85029523925
-
-
Advances in Cryptology, CRYPTO '91, Lecture Notes in Computer Science
-
den Boer, В., Bosselaers, A.: An attack on the last two rounds of MD4, Advances in Cryptology, CRYPTO '91, Lecture Notes in Computer Science, vol. 576, Springer-Verlag, 1992, pp. 194-203.
-
(1992)
An Attack on the Last Two Rounds of MD4
, vol.576
, pp. 194-203
-
-
Den Boer, В.1
Bosselaers, A.2
-
7
-
-
0003602325
-
-
Request for Comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1
-
Rivest, R.: The MD4 message-digest algorithm, Request for Comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.
-
(1992)
The MD4 Message-Digest Algorithm
-
-
Rivest, R.1
-
8
-
-
0003602325
-
-
Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April
-
Rivest, R.: The MD5 message-digest algorithm, Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
-
(1992)
The MD5 Message-Digest Algorithm
-
-
Rivest, R.1
-
9
-
-
84948973102
-
-
Fast Software Encryption (Proceedings of the 1994 Leuven Workshop on Cryptographic Algorithms), Lecture Notes in Computer Science
-
Vaudenay, S.: On the need of multipermutations: Cryptanalysis of MB 4 and SAFER, Fast Software Encryption (Proceedings of the 1994 Leuven Workshop on Cryptographic Algorithms), Lecture Notes in Computer Science, vol. 1008, Springer-Verlag, 1995, pp. 286-297.
-
(1995)
On the Need of Multipermutations: Cryptanalysis of MB 4 and SAFER
, vol.1008
, pp. 286-297
-
-
Vaudenay, S.1
-
10
-
-
74549196057
-
How to swindle Rabin
-
Yuval, G.: How to swindle Rabin, Cryptologia, vol. 3, no. 3, 1979, pp. 187-189.
-
(1979)
Cryptologia
, vol.3
, Issue.3
, pp. 187-189
-
-
Yuval, G.1
|