Publisher
Springer Berlin Heidelberg
Reference4 articles.
1. C. Charnes, J.Pieprzyk; Attacking the SL2 Hashing Scheme; Proceedings of ASIA-CRYPT '94, J.Pieprzyk (Ed.), LNCS, Springer, pp. 268–276.
2. W. Geiselmann, D. Gollmann; Self-Dual Basis in $$F_{q^n }$$ ; Designs, Codes and Cryptography, Vol. 3, No. 4, pp. 333–345, 1993.
3. R. Lidl, H. Niederreiter; Introduction to Finite Fields and Their Applications; Cambridge University Press, 1986.
4. J-P. Tillich, G.Zémor; Hashing with 263–02; Proceedings of CRYPTO '94, Y. Desmet (Ed.), LNCS Vol 839, Springer, pp. 40–49, 1994.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hash Functions;Encyclopedia of Cryptography and Security;2011
2. Cryptanalysis of the Tillich–Zémor Hash Function;Journal of Cryptology;2010-03-16
3. Hashing with Polynomials;Information Security and Cryptology – ICISC 2006;2006
4. Weaknesses in the SL2($$ \mathbb{F}_{2^n } $$) Hashing Scheme;Advances in Cryptology — CRYPTO 2000;2000
5. The State of Cryptographic Hash Functions;Lectures on Data Security;1999