Rotation-Symmetric Functions and Fast Hashing
暂无分享,去创建一个
[1] Pieter Retief Kasselman,et al. Analysis and design of cryptographic hash functions , 1999 .
[2] Hans Dobbertin,et al. Cryptanalysis of MD4 , 1996, Journal of Cryptology.
[3] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[4] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[5] Joos Vandewalle,et al. Fast Hashing on the Pentium , 1996, CRYPTO.
[6] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[7] Hans Dobbertin. Cryptanalysis of MD5 Compress , 1996 .
[8] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[9] Jennifer Seberry,et al. Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract) , 1993, CRYPTO.
[10] Jennifer Seberry,et al. HAVAL - A One-Way Hashing Algorithm with Variable Length of Output , 1992, AUSCRYPT.
[11] Kaisa Nyberg,et al. On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.
[12] Bruce E. Sagan,et al. The symmetric group - representations, combinatorial algorithms, and symmetric functions , 2001, Wadsworth & Brooks / Cole mathematics series.
[13] Jr. Burton S. Kalishi,et al. The MD4 Message Digest Algorithm (Abstract) , 1991, EUROCRYPT.
[14] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[15] Willi Meier,et al. Nonlinearity Criteria for Cryptographic Functions , 1990, EUROCRYPT.
[16] Réjane Forré,et al. The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.
[17] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[18] H. Feistel. Cryptography and Computer Privacy , 1973 .
[19] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[20] O. Antoine,et al. Theory of Error-correcting Codes , 2022 .