Design principles for dedicated hash functions
From MaRDI portal
Publication:4499397
Recommendations
Cited in
(11)- Combining Compression Functions and Block Cipher-Based Hash Functions
- Hashing with Polynomials
- Prepaid electronic cheques using public-key certificates
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
- An image encryption scheme with a pseudorandom permutation based on chaotic maps
- Find me a hash.
- Cryptanalysis of TWOPRIME
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Design of new XOR-based hash functions for cache memories
- Image encryption algorithm based on chaotic economic model
- A fast software one-way hash function
This page was built for publication: Design principles for dedicated hash functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4499397)