MJO Saarinen - International workshop on fast software encryption, 2003 - Springer
We cryptanalyse some block cipher proposals that are based on dedicated hash functions SHA-1 and MD5. We discuss a related-key attack against SHACAL-1 and present a method …
In this paper we consider the problem of designing load balancing protocols in distributed systems where the participants (eg computers, users) are capable of manipulating the load …
S Hirose - Selected Areas in Cryptography: 9th Annual …, 2003 - Springer
There are many proposals of unkeyed hash functions based on block ciphers. Preneel, Govaerts and Vandewalle, in their CRYPTO'93 paper, presented the general model of …
T Matsuo, K Kurosawa - Information Security and Privacy: 8th Australasian …, 2003 - Springer
In this paper, we study variants of the parallel hash function construction of Damgård. We first show an improvement such that the number of processors is almost a half if| M|=(2 s+ 1) …