HAS-V: A New Hash Function with Variable Output Length
暂无分享,去创建一个
[1] Air Force Air Force Materiel Command Hq. FIPS-PUB-180-1 , 1995 .
[2] Jennifer Seberry,et al. Advances in Cryptology — AUSCRYPT '92 , 1992, Lecture Notes in Computer Science.
[3] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[4] Antoine Joux,et al. Differential Collisions in SHA-0 , 1998, CRYPTO.
[5] Hans Dobbertin. Cryptanalysis of MD4 , 1996, FSE.
[6] Paul C. van Oorschot,et al. Parallel collision search with application to hash functions and discrete logarithms , 1994, CCS '94.
[7] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[8] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[9] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[10] Joos Vandewalle,et al. SHA: A Design for Parallel Architectures? , 1997, EUROCRYPT.
[11] Chae Hoon Lim,et al. A Study on the Proposed Korean Digital Signature Algorithm , 1998, ASIACRYPT.
[12] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[13] Gideon Yuval,et al. How to Swindle Rabin , 1979, Cryptologia.
[14] Joos Vandewalle,et al. Fast Hashing on the Pentium , 1996, CRYPTO.
[15] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[16] Antoon Bosselaers,et al. An Attack on the Last Two Rounds of MD4 , 1991, CRYPTO.
[17] Jennifer Seberry,et al. Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion , 1992, AUSCRYPT.
[18] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[19] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[20] Jennifer Seberry,et al. Nonlinearity and Propagation Characteristics of Balanced Boolean Functions , 1995, Inf. Comput..
[21] Antoon Bosselaers,et al. Collisions for the Compressin Function of MD5 , 1994, EUROCRYPT.
[22] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[23] Tor Helleseth,et al. Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.
[24] Jennifer Seberry,et al. HAVAL - A One-Way Hashing Algorithm with Variable Length of Output , 1992, AUSCRYPT.
[25] Kazuo Ohta,et al. Advances in Cryptology — ASIACRYPT’98 , 2002, Lecture Notes in Computer Science.