Assche. Sponge functions (2007)

View PDF

Download Links

by Guido Bertoni , Joan Daemen , Michael Peeters , Gilles Van Assche , Guido Bertoni , Joan Daemen , Michaël Peeters , Gilles Van Assche
Citations:23 - 0 self

Documents Related by Co-Citation

1425 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
55 G.V.: On the Indifferentiability of the Sponge Construction – Guido Bertoni, Joan Daemen, Gilles Van Assche - 2008
196 Finding collisions in the full SHA-1 – Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - 2005
550 Differential Cryptanalysis of DES-like Cryptosystems – Eli Biham, Adi Shamir - 1991
665 How to construct random functions – O Goldreich, S Goldwasser, S Micali - 1986
2724 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
884 How To Prove Yourself: Practical Solutions to Identification and Signature Problems – Amos Fiat, Adi Shamir - 1987
503 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
251 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005