Author:
Andreeva Elena,Mennink Bart,Preneel Bart
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference27 articles.
1. Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) Advances in Cryptology—CRYPTO’89. Volume 435 of Lecture Notes in Computer Science, pp. 416–427. Springer, New York (1990)
2. Merkle, R.C.: One way hash functions and DES. In: Brassard, G. (ed.) Advances in Cryptology—CRYPTO’89. Volume 435 of Lecture Notes in Computer Science, pp. 428–446. Springer, New York (1990)
3. Lai, X., Massey, J.L.: Hash function based on block ciphers. In: Rueppel, R.A. (ed.) Advances in Cryptology—EUROCRYPT’92. Volume 658 of Lecture Notes in Computer Science, pp. 55–70. Springer, New York (1992)
4. National Institute for Standards and Technology. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) Family (2007)
5. Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Seven-property-preserving iterated hashing: ROX. In: Kurosawa, K. (ed.) Advances in Cryptology—ASIACRYPT 2007. Volume 4833 of Lecture Notes in Computer Science, pp. 130–146. Springer, New York (2007)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献