Broad View of Cryptographic Hash Functions
暂无分享,去创建一个
[1] Mohammad A. AlAhmad,et al. Protection of the Texts Using Base64 and MD5 , 2012 .
[2] Stefan Lucks,et al. Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..
[3] Mohammad A. AlAhmad,et al. Security threats of finger print biometric in network system environment , 2011 .
[4] Xiaoyun Wang,et al. Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.
[5] I. F. Alshaikhli,et al. Comparison and Analysis Study of SHA-3 Finalists , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[6] Jennifer Seberry,et al. HAVAL - A One-Way Hashing Algorithm with Variable Length of Output , 1992, AUSCRYPT.
[7] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[8] G. Geetha,et al. Cryptographic Hash Functions: A Review , 2012 .
[9] Guido Bertoni,et al. On the Indifferentiability of the Sponge Construction , 2008, EUROCRYPT.
[10] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[11] Anne Canteaut,et al. Higher-Order Differential Properties of Keccak and Luffa , 2011, FSE.
[12] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[13] Vincent Rijmen,et al. Update on SHA-1 , 2005, CT-RSA.
[14] Ueli Maurer,et al. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology , 2004, TCC.
[15] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[16] Antoine Joux,et al. Collisions of SHA-0 and Reduced SHA-1 , 2005, EUROCRYPT.
[17] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[18] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[19] Bart Preneel,et al. Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein , 2012, AFRICACRYPT.
[20] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[21] John Kelsey,et al. Herding Hash Functions and the Nostradamus Attack , 2006, EUROCRYPT.
[22] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[23] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[24] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[25] James H. Davenport,et al. Cryptographic Hash Functions: Recent Design Trends and Security Notions , 2011, IACR Cryptol. ePrint Arch..