scientific article; zbMATH DE number 1088255
From MaRDI portal
Publication:4364572
zbMATH Open0882.94023MaRDI QIDQ4364572FDOQ4364572
Authors: Bart Preneel, Lars R. Knudsen
Publication date: 10 March 1998
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Linear codes (general theory) (94B05)
Cited In (24)
- New Constructions for Secure Hash Functions
- Title not available (Why is that?)
- Fast software-oriented hash function based on data-dependent lookup operations
- MRD hashing.
- Provably Good Codes for Hash Function Design
- Construction of secure and fast hash functions using nonbinary error-correcting codes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Progress in Cryptology – Mycrypt 2005
- Fast hash functions and convolution product
- Title not available (Why is that?)
- On the collision and preimage security of MDC-4 in the ideal cipher model
- One Way Hash Functions and DES
- Title not available (Why is that?)
- Cryptanalysis of MDC-2
- Source Coding Using Families of Universal Hash Functions
- Open problems in hash function security
- MRD hashing
- MJH: a faster alternative to MDC-2
- A new non-Merkle-Damgård structural hash function with provable security
- Tiger: a fast new hash function
- Constructing an Ideal Hash Function from Weak Ideal Compression Functions
- Selected Areas in Cryptography
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4364572)