Parallel collision search with cryptanalytic applications

PC Van Oorschot, MJ Wiener - Journal of cryptology, 1999 - Springer
A simple new technique of parallelizing methods for solving search problems which seek
collisions in pseudorandom walks is presented. This technique can be adapted to a wide …

Secure audit logs to support computer forensics

B Schneier, J Kelsey - ACM Transactions on Information and System …, 1999 - dl.acm.org
In many real-world applications, sensitive information must be kept it log files on an
untrusted machine. In the event that an attacker captures this machine, we would like to …

Cryptographic primitives for information authentication—State of the art

B Preneel - State of the Art in Applied Cryptography: Course on …, 1999 - Springer
This paper describes the state of the art for cryptographic primitives that are used for
protecting the authenticity of information: cryptographic hash functions and digital signature …

Practical Intranet Security: Overview of the State of the Art and Available Technologies

PM Ashley, M Vandenwauver - 1999 - books.google.com
Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which
an intranet can be violated and gives a thorough review of the technologies that can be used …

On the security of iterated message authentication codes

B Preneel, PC Van Oorschot - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
The security of iterated message authentication code (MAC) algorithms is considered, and in
particular, those constructed from unkeyed hash functions. A new MAC forgery attack …

Software performance of universal hash functions

W Nevelsteen, B Preneel - International Conference on the Theory and …, 1999 - Springer
This paper compares the parameters sizes and software performance of several recent
constructions for universal hash functions: bucket hashing, polynomial hashing, Toeplitz …

Recent developments in the design of conventional cryptographic algorithms

B Preneel, V Rijmen, A Bosselaers - State of the Art in Applied …, 1999 - Springer
This paper examines proposals for three cryptographic primitives: block ciphers, stream
ciphers, and hash functions. It provides an overview of the design principles of a large …

[图书][B] Secure and efficient time-stamping systems

H Lipmaa - 1999 - lepo.it.da.ut.ee
Because of the increasing importance of the international business and communication, it
has become necessary to forward signed documents to a long distance. Traditional mail …

A multicast gateway for dial-in lines

C Kuhmünch - … Conference on Multimedia Applications, Services, and …, 1999 - Springer
With the increasing number of MBone sessions the interest of home users to participate in
multicast sessions is also increasing. Unfortunately the cost for the hardware necessary to …

One-way hash functions with changeable parameters

TM Hsieh, YS Yeh, CH Lin, SH Tuan - Information Sciences, 1999 - Elsevier
In this paper, four new algorithms for improvements of MD5 and SHA-Keyed/Unkeyed MD5
and Keyed/Unkeyed SHA are proposed. We change the mode of fixed retrieval of the …