Documents Related by Co-Citation

16 Computer data authentication. Federal Information Processing Standards Publication 113 – FIPS - 1994
20 Information technology security techniques data integrity mechanism using a cryptographic check function employing 21 block cipher algorithm. International Organization for Standards – IsoIec - 1999
10 How to Swindle Rabin. Cryptologia – G Yuval - 1979
20 Design of Hashing Algorithms – J Pieprzyk, B Sadeghiyan - 1993
2 Digital Signaure - an update – W L Price - 1984
2 Collision resistant hash functions based on block ciphers – B Preneel, R Govaerts, J Vandewalle
2 Cryptanalysis of the Yi-Lam hash – David Wagner
3 Analysis of a Hash Function of Yi and Lam – K Martin - 1998
6 CBC MACs for arbitrary length messages: The three key constructions – J Black, P Rogaway
21 cryptography: A New Dimension in Data security,Iohn – c Meyer, S Matyas - 1982
10 Applying the RSA Digital Signature to Electronic Mail – D W Davies - 1983
30 Differential Cryptanalysis of Feal and N-Hash – Eli Biham, Adi Shamir - 1991
10 Delescaille: How Easy is Collision Search. New Results and Applications to DES – J-J Quisquater, J P
6 New 128-bit Hash functions – K Ohtaand M Iwata - 1989
8 A new hash function based on block cipher – X Yi, K-Y Lam - 1997
193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
44 CBC MAC for Real-Time Data Sources – Erez Petrank , Charles Rackoff - 1997
31 Signatures with RSA and Other Public-Key Cryptosystems Р“Digital D E Denning - 1984
666 Cryptography: Theory and Practice – D R Stinson - 2002