메뉴 건너뛰기




Volumn 537 LNCS, Issue , 1991, Pages 477-501

Fast software encryption functions

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; COMPUTER HARDWARE;

EID: 85030316144     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-38424-3_34     Document Type: Conference Paper
Times cited : (44)

References (23)
  • 3
    • 85030313424 scopus 로고    scopus 로고
    • private communication
    • Moti Yung, private communication.
    • Yung, M.1
  • 4
    • 84945163204 scopus 로고    scopus 로고
    • A High Speed Manipulation Detection Code
    • Springer Verlag, Lecture Notes on Computer Science
    • “A High Speed Manipulation Detection Code”, by Roben R. Jueneman, Advances in Cryptology - CRYPTO '86, Springer Verlag, Lecture Notes on Computer Science, Vol. 263, page 327 to 346.
    • Advances in Cryptology - CRYPTO '86 , vol.263 , pp. 327-346
    • Jueneman, R.R.1
  • 5
    • 85034664741 scopus 로고    scopus 로고
    • Another Birthday Attack
    • Springer Verlag, Lecture Notes on Computer Science
    • “Another Birthday Attack” by Don Coppersmith, Advances in Cryptology - CRYPTO '85, Springer Verlag, Lecture Notes on Computer Science, Vol. 218, pages 14 to 17.
    • Advances in Cryptology - CRYPTO '85 , vol.218 , pp. 14-17
    • Coppersmith, D.1
  • 6
    • 84958802026 scopus 로고    scopus 로고
    • A digital signature based on a conventional encryption function
    • Springer Verlag, Lecture Notes on Computer Science
    • “A digital signature based on a conventional encryption function”, by Ralph C. Merkle, Advances in Cryptology CRYPTO 87, Springer Verlag, Lecture Notes on Computer Science, Vol. 293, page 369-378.
    • Advances in Cryptology CRYPTO 87 , vol.293 , pp. 369-378
    • Merkle, R.C.1
  • 7
    • 57849150065 scopus 로고
    • Cryptography and Data Security
    • “Cryptography and Data Security”, by Dorothy E. R. Denning, Addison-Wesley 1982, page 170.
    • (1982) Addison-Wesley , pp. 170
    • Denning, D.E.R.1
  • 8
    • 0019587141 scopus 로고
    • On the security of multiple encryption
    • July
    • “On the security of multiple encryption”, by Ralph C. Merkle, CACM Vol. 24 No. 7, July 1981 pages 465 to 467.
    • (1981) CACM , vol.24 , Issue.7 , pp. 465-467
    • Merkle, R.C.1
  • 10
    • 84890522850 scopus 로고
    • Communication Theory of Secrecy Systems
    • Oct
    • “Communication Theory of Secrecy Systems”, by C. E. Shannon, Bell Sys. Tech. Jour. 28 (Oct. 1949) 656-715
    • (1949) Bell Sys. Tech. Jour , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 12
    • 0022029028 scopus 로고
    • Generating strong one-way functions with cryptographic algorithm
    • March
    • “Generating strong one-way functions with cryptographic algorithm”, by S. M. Matyas, C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A, March 1985 pages 5658-5659
    • (1985) IBM Technical Disclosure Bulletin , vol.27 , Issue.10 A , pp. 5658-5659
    • Matyas, S.M.1    Meyer, C.H.2    Oseas, J.3
  • 13
    • 85030315851 scopus 로고
    • preliminary version June 9, Analysis of the system presented in [4]
    • “Analysis of Jueneman’s MDC Scheme”, by Don Coppersmith, preliminary version June 9, 1988. Analysis of the system presented in [4]
    • (1988) Analysis of Jueneman’s MDC Scheme
    • Coppersmith, D.1
  • 14
    • 0024012695 scopus 로고
    • The Data Encryption Standard: Past and Future
    • May
    • “The Data Encryption Standard: Past and Future” by M.E. Smid and D.K. Branstad, Proc. of the IEEE, Vol 76 No. 5 pp 550-559, May 1988
    • (1988) Proc. of the IEEE , vol.76 , Issue.5 , pp. 550-559
    • Smid, M.E.1    Branstad, D.K.2
  • 15
    • 85030329445 scopus 로고
    • Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information
    • U.S. Government Priming Office, October
    • “Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information”, U.S. Congress, Office of Technology Assessment, OTA-CIT-310, U.S. Government Priming Office, October 1987
    • (1987) U.S. Congress, Office of Technology Assessment, OTA-CIT-310
  • 16
    • 0017501281 scopus 로고
    • Exhaustive cryptanalysis of the NBS data encryption standard
    • June
    • “Exhaustive cryptanalysis of the NBS data encryption standard”, by Whitfield Diffie and Martin Heilman, Computer, June 1977, pages 74-78
    • (1977) Computer , pp. 74-78
    • Diffie, W.1    Heilman, M.2
  • 18
    • 0000966673 scopus 로고    scopus 로고
    • One Way Hash Functions and DES
    • “One Way Hash Functions and DES”, by Ralph C. Merkle, Crypto '89.
    • Crypto '89
    • Merkle, R.C.1
  • 20
    • 0001820140 scopus 로고
    • Cryptography and Computer Privacy
    • May
    • “Cryptography and Computer Privacy”, by H. Feistei, Sei. Amer. Vol. 228, No. 5 pp 15-23, May 1973
    • (1973) Sei. Amer , vol.228 , Issue.5 , pp. 15-23
    • Feistei, H.1
  • 23
    • 85030317044 scopus 로고    scopus 로고
    • A Fast Software One-Way Hash Function
    • submitted to the, The C source for this method is available by anonymous FTP from arisia.xerox.com (13.1.100.206) in directory /pub/hash
    • “A Fast Software One-Way Hash Function,” submitted to the Journal of Cryptology. The C source for this method is available by anonymous FTP from arisia.xerox.com (13.1.100.206) in directory /pub/hash.
    • Journal of Cryptology


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.