Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?
From MaRDI portal
Publication:3506408
DOI10.1007/978-3-540-68914-0_10zbMath1319.94061MaRDI QIDQ3506408
Yevgeniy Dodis, Prashant Puniya
Publication date: 13 June 2008
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68914-0_10
94A60: Cryptography
Related Items
How to Fill Up Merkle-Damgård Hash Functions, Salvaging Merkle-Damgård for Practical Applications, Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders