Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?
From MaRDI portal
Publication:3506408
DOI10.1007/978-3-540-68914-0_10zbMath1319.94061OpenAlexW1568101057MaRDI QIDQ3506408
Yevgeniy Dodis, Prashant Puniya
Publication date: 13 June 2008
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68914-0_10
Related Items (5)
Revisiting the indifferentiability of the sum of permutations ⋮ How to Fill Up Merkle-Damgård Hash Functions ⋮ Salvaging Merkle-Damgård for Practical Applications ⋮ Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders ⋮ Unnamed Item
This page was built for publication: Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?