Cryptographic hash functions

B Preneel - European Transactions on Telecommunications, 1994 - Wiley Online Library
Hash functions were introduced in cryptology in the late seventies as a tool to protect the
authenticity of information. Soon it became clear that they were a very useful building block …

[图书][B] Block ciphers-analysis, design and applications

LR Knudsen - 1994 - pdfs.semanticscholar.org
Block Ciphers - Analysis, Design and Applications Page 1 Block Ciphers - Analysis, Design and
Applications Lars Ramkilde Knudsen July 1, 1994 Page 2 2 Page 3 Contents 1 Introduction …

Collisions and inversions for Damgård's whole hash function

J Patarin - International Conference on the Theory and …, 1994 - Springer
Ivan Damgård gave a great theorem about hash functions in Then, he suggested, among
others, to choose for fa knapsack scheme. However, in [1] and [4] it was shown that it is …

The breaking of the AR hash function

IB Damgård, LR Knudsen - … in Cryptology—EUROCRYPT'93: Workshop on …, 1994 - Springer
The AR hash function has been proposed by Algorithmic Research Ltd and is currently
being used in practice in the German banking world. AR hash is based on DES and a …

[PDF][PDF] Message Authentication with Cryptographic Hash Functions

B Preneel - Proceedings of the 2nd URSI Forum 1994, 1994 - esat.kuleuven.be
During the last decades, the nature of telecommunications has changed completely. We are
confronted with an explosion of mobile communications. Electronic mail has become the …

[引用][C] Collisions and Inversions for Damgård's Whole

J Patarin - Advances in Cryptology--ASIACRYPT., 1994 - Springer-Verlag