[PDF][PDF] Analysis and design of cryptographic hash functions

B Preneel - 1993 - Citeseer
The subject of this thesis is the study of cryptographic hash functions. The importance of
hash functions for protecting the authenticity of information is demonstrated. Applications …

[PDF][PDF] On the design and security of block ciphers

X Lai - 1992 - research-collection.ethz.ch
Secret-key block ciphers are the subject of this work. The design and security of block
ciphers, together with their application in hashing techniques, are considered. In particular …

Cryptographic hash functions

B Preneel - European Transactions on Telecommunications, 1994 - Wiley Online Library
Hash functions were introduced in cryptology in the late seventies as a tool to protect the
authenticity of information. Soon it became clear that they were a very useful building block …

Hash functions based on block ciphers

X Lai, JL Massey - Workshop on the Theory and Application of of …, 1992 - Springer
Iterated hash functions based on block ciphers are treated. Five attacks on an iterated hash
function and on its round function are formulated. The wisdom of strengthening such hash …

Hash functions and RFID tags: Mind the gap

A Bogdanov, G Leander, C Paar, A Poschmann… - … and Embedded Systems …, 2008 - Springer
The security challenges posed by RFID-tag deployments are well-known. In response there
is a rich literature on new cryptographic protocols and an on-tag hash function is often …

The hash function BLAKE

JP Aumasson, W Meier, RCW Phan, L Henzen - 2014 - Springer
This book is about the cryptographic hash function BLAKE, one of the five final contenders in
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …

[图书][B] Block ciphers-analysis, design and applications

LR Knudsen - 1994 - pdfs.semanticscholar.org
Block Ciphers - Analysis, Design and Applications Page 1 Block Ciphers - Analysis, Design and
Applications Lars Ramkilde Knudsen July 1, 1994 Page 2 2 Page 3 Contents 1 Introduction …

[PDF][PDF] Cryptographic hash functions: an overview

B Preneel, R Govaerts, J Vandewalle - Proceedings of the 6th international …, 1993 - Citeseer
Cryptographic hash functions are a useful building block for several cryptographic
applications. The most important are certainly the protection of information authentication …

Design and security analysis of two robust keyed hash functions based on chaotic neural networks

N Abdoun, S El Assad, O Deforges, R Assaf… - Journal of Ambient …, 2020 - Springer
In this paper, we designed, implemented, and analyzed the performance, in terms of security
and speed, of two proposed keyed Chaotic Neural Network (CNN) hash functions based on …

Indifferentiable security analysis of popular hash functions with prefix-free padding

D Chang, S Lee, M Nandi, M Yung - … on the Theory and Application of …, 2006 - Springer
Understanding what construction strategy has a chance to be a good hash function is
extremely important nowadays. In TCC'04, Maurer et al.[13] introduced the notion of …