Affiliation:
1. Attached Institute of ETRI
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference21 articles.
1. [1] F. Armknecht, E. Fleischmann, M. Krause, J. Lee, M. Stam, and J. Steinberger, “The preimage security of double-block-length compression functions,” ASIACRYPT 2011, LNCS 7073, pp.233-251, 2011.
2. [2] J. Black, P. Rogaway, and T. Shrimpton, “Black-box analysis of the block-cipher-based hash-function constructions from PGV,” CRYPTO 2002, LNCS 2442, pp.320-335, 2002.
3. [3] R.D. Dean, Formal Aspects of Mobile Code Security, Ph.D Dissertion, Princeton University, Jan. 1999.
4. [4] U.S. Department of Commerce/National Institute of Standards and Technology, “Data Encryption Standard (DES),” FIPS PUB 46-3, Reaffirmed Oct. 25th 1999.
5. [5] E. Fleischmann, C. Forler, and S. Lucks, “The collision security of MDC-4,” AFRICACRYPT 2012, LNCS 7374, pp.252-269, 2012.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MDC-2 and MDC-4;Encyclopedia of Cryptography, Security and Privacy;2024
2. Quantum cryptanalysis of the full AES-256-based Davies–Meyer, Hirose and MJH hash functions;Quantum Information Processing;2022-04-27
3. Improving MDC-4 to Be More Secure;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2019-01-01
4. Open problems in hash function security;Designs, Codes and Cryptography;2015-05-28