메뉴 건너뛰기




Volumn 434 LNCS, Issue , 1990, Pages 102-109

2n-bit hash-functions using n-bit symmetric block cipher algorithms

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS; SECURITY OF DATA;

EID: 84985801328     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46885-4_13     Document Type: Conference Paper
Times cited : (19)

References (8)
  • 1
    • 85034664741 scopus 로고
    • "Another birthday attack", Advances in Cryptology
    • Springer-Verlag
    • D. Coppersmith, "Another birthday attack", Advances in Cryptology, Proc. of Crypto‘85, LNCS, Vol. 218, Springer-Verlag, 1986, pp. 14-17.
    • (1986) Proc. of Crypto‘85, LNCS , vol.218 , pp. 14-17
    • Coppersmith, D.1
  • 5
    • 0002182072 scopus 로고    scopus 로고
    • Secure program load with Manipulation Detection Code
    • C. H. Meyer and M. Schilling, "Secure program load with Manipulation Detection Code", Securicom 88, pp. 111-130.
    • Securicom , vol.88 , pp. 111-130
    • Meyer, C.H.1    Schilling, M.2
  • 8
    • 74549196057 scopus 로고
    • How to swindle Rabin
    • G. Yuval, "How to swindle Rabin", Cryptologia, Vol. 3, Jul. 1979, pp. 187-189.
    • (1979) Cryptologia , vol.3 , pp. 187-189
    • Yuval, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.