Secret-key block ciphers are the subject of this work. The design and security of block ciphers, together with their application in hashing techniques, are considered. In particular …
B Preneel - European Transactions on Telecommunications, 1994 - Wiley Online Library
Hash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block …
X Lai, JL Massey - Workshop on the Theory and Application of of …, 1992 - Springer
Iterated hash functions based on block ciphers are treated. Five attacks on an iterated hash function and on its round function are formulated. The wisdom of strengthening such hash …
The security challenges posed by RFID-tag deployments are well-known. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is often …
This book is about the cryptographic hash function BLAKE, one of the five final contenders in the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …
B Preneel, R Govaerts, J Vandewalle - Proceedings of the 6th international …, 1993 - Citeseer
Cryptographic hash functions are a useful building block for several cryptographic applications. The most important are certainly the protection of information authentication …
In this paper, we designed, implemented, and analyzed the performance, in terms of security and speed, of two proposed keyed Chaotic Neural Network (CNN) hash functions based on …
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al.[13] introduced the notion of …