Author:
Luo Yiyuan,Lai Xuejia,Jia Tiejun
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference29 articles.
1. FIPS. FIPS 180-1 Secure Hash Standard: Federal Information Processing Standard (FIPS) Publication 180-1 National Institute of Standards and Technology, US Department of Commerce Washington D.C (1995)
2. Fleischmann, E., Gorski, M., Lucks, S.: Security of cyclic double block length hash functions. In: Cryptography and Coding 2009, vol. LNCS 5921, pp. 153–175. Springer-Verlag (2009)
3. Fleischmann, E., Gorski, M., Lucks, S.: On the security of tandem-DM. LNCS of Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5665, pp. 84–103. Springer Verlag, Leuven Belgium (2009)
4. Hattori, M., Hirose, S., Yoshida, S.: Analysis of double block length hash functions. Cryptogr. Coding Proc. 2898, 290–302 (2003)
5. Hirose, S.: A security analysis of double-block-length hash functions with the rate 1. Ieice Trans. on Fund. of Elect. Commun. Comput. Scie. E89A10, 2575–2582 (2006)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A new authentication procedure for client-server applications using HMAC;Journal of Discrete Mathematical Sciences and Cryptography;2021-07-04
2. A new one time password mechanism for client-server applications;Journal of Discrete Mathematical Sciences and Cryptography;2019-11-17