An Integrity Check Value Algorithm for Stream Ciphers
暂无分享,去创建一个
[1] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[2] Hans-Joachim Knobloch,et al. A Smart Card Implementation of the Fiat-Shamir Identification Scheme , 1988, EUROCRYPT.
[3] R. R. Jueneman,et al. A High Speed Manipulation Detection Code , 1986, CRYPTO.
[4] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[5] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[6] Gideon Yuval,et al. How to Swindle Rabin , 1979, Cryptologia.
[7] G. Hardy. The Theory of Numbers , 1922, Nature.
[8] Gilles Brassard,et al. On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys , 1982, CRYPTO.
[9] Xuejia Lai,et al. A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers , 1992, AUSCRYPT.
[10] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[11] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[12] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[13] Xuejia Lai,et al. Hash Function Based on Block Ciphers , 1992, EUROCRYPT.