scientific article; zbMATH DE number 1759316
From MaRDI portal
Publication:4536253
Recommendations
Cited in
(15)- Cryptographic Hash Functions and Some Applications to Information Security
- scientific article; zbMATH DE number 1583800 (Why is no real title available?)
- Provably Good Codes for Hash Function Design
- Block-cipher-based tree hashing
- scientific article; zbMATH DE number 1942817 (Why is no real title available?)
- On high-rate cryptographic compression functions
- Blockcipher-Based Hashing Revisited
- scientific article; zbMATH DE number 503327 (Why is no real title available?)
- Estimates of the neighborhood volumes of binary codes via their weight spectra
- Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
- Collision attacks against the Knudsen-Preneel compression functions
- Edon-\(\mathcal R (256,384,512)\) -- an efficient implementation of Edon-\(\mathcal R\) family of cryptographic hash functions.
- Cryptographic Hash Algorithms Based on Time Averaging Techniques
- A new black box analysis of hash functions based on block ciphers
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4536253)