Sha-zam: A Block Cipher. Fast as DES, Secure as SHA
暂无分享,去创建一个
[1] Eli Biham,et al. Two Practical and Provably Secure Block Ciphers: BEARS and LION , 1996, FSE.
[2] Sarvar Patel,et al. An Efficient Discrete Log Pseudo Random Generator , 1998, CRYPTO.
[3] N. Åslund. Universal Hash Functions & Hard Core Bits , 1995 .
[4] Oded Goldreich,et al. RSA/Rabin Bits are 1/2 + 1/poly(log N) Secure , 1984, FOCS.
[5] U. Maurer. A Simpliied and Generalized Treatment of Luby-rackoo Pseudorandom Permutation Generators , 1992 .
[6] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[7] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[8] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[9] Bart Preneel,et al. Integrity Primitives for Secure Information Systems , 2005, Lecture Notes in Computer Science.
[10] M. Näslund. All Bits in ax + b mod p are Hard , 1996, CRYPTO 1996.
[11] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[12] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[13] M. Blum,et al. A simple secure pseudo-random number generator , 1982 .
[14] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[15] Adi Shamir,et al. On the cryptographic security of single RSA bits , 1983, STOC '83.