A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] R. R. Jueneman,et al. A High Speed Manipulation Detection Code , 1986, CRYPTO.
[3] Xuejia Lai,et al. On the design and security of block ciphers , 1992 .
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] Robert S. Winternitz. Producing a One-Way Hash Function from DES , 1983, CRYPTO.
[6] Yvo Desmedt,et al. Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences , 1985, CRYPTO.
[7] Gilles Brassard,et al. Modern cryptology , 2006 .
[8] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[9] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[10] Solomon W. Golomb,et al. Shift Register Sequences , 1981 .
[11] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.