A cellular automaton based fast one-way hash function suitable for hardware implementation (1998)

by Miodrag Mihaljevic , Yuliang Zheng , Hideki Imai
Venue:In Public Key Cryptography, number 1431 in Lecture Notes in Computer Science
Citations:6 - 0 self

Active Bibliography

2 A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) – Miodrag Mihaljevic, Yuliang Zheng, Hideki Imai - 1999
Cryptographic Hash Functions: A Review – Rajeev Sobti, G. Geetha
9 Hash Functions Based on Block Ciphers and Quaternary Codes – Lars Knudsen, Bart Preneel - 1996
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
3 Design principles for dedicated hash functions – Bart Preneel - 1994
35 Cryptographic Hash Functions: A Survey – S. Bakhtiari, R. Safavi-naini, J. Pieprzyk, Centre Computer - 1995
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
1 Pseudorandom Number Generation Based on Controllable Cellular Automata”, Special issue: Advanced services for – Sheng-uei Guan, Shu Zhang - 2004
2 A Family of Controllable Cellular Automata for Pseudorandom Number Generation – Sheng-uei Guan, Shu Zhang
16 A Survey on Cellular Automata – Niloy Ganguly, Biplab K Sikdar, Andreas Deutsch, Geoffrey Canright, P Pal Chaudhuri - 2003
PSEUDO-RANDOM SEQUENCES, BOOLEAN FUNCTIONS AND CELLULAR AUTOMATA – Fonctions Booléennes Cryptographie, Patrick Lacharme, Bruno Martin, Patrick Solé - 2008
Author manuscript, published in "International Workshop on Cellular Automata, Hiroshima: Japon (2006)" A Walsh exploration of elementary CA rules – Bruno Martin, Université De Nice Sophia-antipolis - 2008
5 Hash functions and the MAC using all-or-nothing property – Sang Uk Shin, Kyung Hyune Rhee - 1999
16 Hash Functions: From Merkle-Damgård to Shoup – Ilya Mironov - 2001
24 The Classification of Hash Functions – Ross Anderson - 1993
10 Towards Secure and Fast Hash Functions – Takashi Satoh, Mio Haga, Kaoru Kurosawa - 1999
2 Collision Attacks on MD5 and SHA-1: Is this the “Sword of Damocles" for Electronic Commerce? – Praveen Gauravaram, Adrian McCullagh, Ed Dawson - 2006
27 Hash function balance and its impact on birthday attacks – Mihir Bellare, Tadayoshi Kohno - 2004
Chinese Academy of Sciences – Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu