Design principles for dedicated hash functions
From MaRDI portal
Publication:4499397
DOI10.1007/3-540-58108-1_10zbMATH Open0943.94524OpenAlexW1503405832MaRDI QIDQ4499397FDOQ4499397
Publication date: 30 August 2000
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-58108-1_10
Recommendations
Cited In (8)
- Prepaid electronic cheques using public-key certificates
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- An image encryption scheme with a pseudorandom permutation based on chaotic maps
- Find me a hash.
- Cryptanalysis of TWOPRIME
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Image encryption algorithm based on chaotic economic model
- A fast software one-way hash function
Uses Software
This page was built for publication: Design principles for dedicated hash functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4499397)