Cryptographic sponge functions

作者: Michaël P , Guido B , Joan D

DOI:

关键词:

摘要:

参考文章(39)
Antoine Joux, Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions Advances in Cryptology – CRYPTO 2004. pp. 306- 316 ,(2004) , 10.1007/978-3-540-28628-8_19
Morris Dworkin, Request for Review of Key Wrap Algorithms. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 340- ,(2004)
Frédéric Muller, Differential Attacks against the Helix Stream Cipher fast software encryption. pp. 94- 108 ,(2004) , 10.1007/978-3-540-25937-4_7
Thomas Baignères, Jacques Stern, Serge Vaudenay, Linear cryptanalysis of non binary ciphers international conference on selected areas in cryptography. pp. 184- 211 ,(2007) , 10.1007/978-3-540-77360-3_13
Moses Liskov, Constructing an ideal hash function from weak ideal compression functions international conference on selected areas in cryptography. pp. 358- 375 ,(2006) , 10.1007/978-3-540-74462-7_25
Anand Desai, Alejandro Hevia, Yiqun Lisa Yin, A Practice-Oriented Treatment of Pseudorandom Number Generators international cryptology conference. pp. 368- 383 ,(2002) , 10.1007/3-540-46035-7_24
Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen, The Grindahl hash functions fast software encryption. pp. 39- 57 ,(2007) , 10.1007/978-3-540-74619-5_3
Daniel J. Bernstein, The Salsa20 Family of Stream Ciphers New Stream Cipher Designs. ,vol. 4986, pp. 84- 97 ,(2008) , 10.1007/978-3-540-68351-3_8
John Kelsey, Bruce Schneier, Second preimages on n -bit hash functions for much less than 2 n work theory and application of cryptographic techniques. pp. 474- 490 ,(2005) , 10.1007/11426639_28
Mihir Bellare, Phillip Rogaway, David Wagner, The EAX Mode of Operation fast software encryption. ,vol. 3017, pp. 389- 407 ,(2004) , 10.1007/978-3-540-25937-4_25