Security considerations for incremental hash functions based on pair block chaining
暂无分享,去创建一个
[1] Mihir Bellare,et al. A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost , 1997, EUROCRYPT.
[2] Kouichi Sakurai,et al. Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model , 2005, FSE.
[3] Mohammad Umar Siddiqi,et al. Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining , 2001, INDOCRYPT.
[4] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[5] Mohammad Umar Siddiqi,et al. Computational complexity and implementation aspects of the incremental hash function , 2003, IEEE Trans. Consumer Electron..
[6] Marc Fischlin. Incremental Cryptography and Memory Checkers , 1997, EUROCRYPT.
[7] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[8] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[9] Gavin Lowe,et al. Some new attacks upon security protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[10] Mihir Bellare,et al. Incremental cryptography and application to virus protection , 1995, STOC '95.
[11] Morris J. Dworkin,et al. SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[12] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.