The Hash Function Cheetah : Specification and Supporting Documentation
暂无分享,去创建一个
[1] Bruce Schneier,et al. Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..
[2] Thomas Peyrin. Cryptanalysis of Grindahl , 2007, ASIACRYPT.
[3] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[4] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[5] Bruce Schneier,et al. Practical cryptography , 2003 .
[6] Christophe De Cannière,et al. Preimages for Reduced SHA-0 and SHA-1 , 2008, CRYPTO.
[7] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[8] Serge Vaudenay,et al. Perfect Diffusion Primitives for Block Ciphers , 2004, Selected Areas in Cryptography.
[9] Eli Biham,et al. A Framework for Iterative Hash Functions - HAIFA , 2007, IACR Cryptol. ePrint Arch..
[10] M. Bellare,et al. HMAC: Keyed-Hashing for Message Authentication, RFC 2104 , 2000 .
[11] Vincent Rijmen,et al. The Wide Trail Design Strategy , 2001, IMACC.
[12] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[13] Shoichi Hirose,et al. A Simple Variant of the Merkle–Damgård Scheme with a Permutation , 2007, Journal of Cryptology.
[14] John Kelsey,et al. Herding Hash Functions and the Nostradamus Attack , 2006, EUROCRYPT.
[15] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[16] Lars R. Knudsen,et al. The Grindahl Hash Functions , 2007, FSE.
[17] Ingrid Verbauwhede,et al. Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm , 2001, CHES.
[18] Joos Vandewalle,et al. Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.