Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Lecture Notes in Computer Science;I.B. Damgard,1988
2. Lecture Notes in Computer Science;I.B. Damgard,1990
3. Preenel, B.: Cryptographic Hash Functions. Transactions on Telecommunications 5, 431–448 (1994)
4. Wegman, M.N., Carter, J.L.: New Hash Functions and Their Use in Authentication and Set Quality. J. of Computer and System Sciences 22, 265–279 (1981)
5. Schneier, B.: Applied Cryptography. John Wiley and Sons, Chichester (1996)