scientific article; zbMATH DE number 1088255
From MaRDI portal
Publication:4364572
Recommendations
Cited in
(24)- Constructing an Ideal Hash Function from Weak Ideal Compression Functions
- Selected Areas in Cryptography
- New Constructions for Secure Hash Functions
- Fast software-oriented hash function based on data-dependent lookup operations
- scientific article; zbMATH DE number 6263174 (Why is no real title available?)
- MRD hashing.
- Provably Good Codes for Hash Function Design
- Construction of secure and fast hash functions using nonbinary error-correcting codes
- scientific article; zbMATH DE number 2043348 (Why is no real title available?)
- scientific article; zbMATH DE number 1942817 (Why is no real title available?)
- scientific article; zbMATH DE number 4132087 (Why is no real title available?)
- Progress in Cryptology – Mycrypt 2005
- Fast hash functions and convolution product
- On the collision and preimage security of MDC-4 in the ideal cipher model
- scientific article; zbMATH DE number 1759316 (Why is no real title available?)
- scientific article; zbMATH DE number 1186882 (Why is no real title available?)
- Cryptanalysis of MDC-2
- One Way Hash Functions and DES
- Open problems in hash function security
- Source Coding Using Families of Universal Hash Functions
- MRD hashing
- MJH: a faster alternative to MDC-2
- A new non-Merkle-Damgård structural hash function with provable security
- Tiger: a fast new hash function
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4364572)