construct a hash function H:(0, 1)*→(0, 1) n from a block cipher E:(0, 1) n×(0, 10 n→(0, 1) n …
L Knudsen,
B Preneel - IEEE transactions on information theory, 2002 - ieeexplore.ieee.org
This paper considers iterated hash functions. It proposes new constructions of fast and
secure compression functions with nl-bit outputs for integers n> 1 based on error-correcting …
This paper analyzes and improves the recently proposed bins and balls signature (BiBa
[23]), a new approach for designing signatures from one-way functions without trapdoors …
This paper analyzes and improves the recently proposed bins and balls signature (BiBa
[23]), a new approach for designing signatures from one-way functions without trapdoors …
H Wu,
F Bao,
RH Deng - Informatica: A Journal of Computing …, 2002 - ink.library.smu.edu.sg
Abstract At PKC 2000, Inoue and Sakurai proposed some methods to design hash functions
from block ciphers and codes (block codes and convolutional codes). They claimed that their …