Structural properties of one-way hash functions (1991)

Cached

Download Links

by Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai
Venue:Advances in cryptology - CRYPTO 90, Lecture Notes in Computer Science
Citations:13 - 5 self

Documents Related by Co-Citation

313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
175 One way hash functions and DES – R Merkle - 1990
197 One-way functions are necessary and sufficient for secure signatures – John Rompel - 1990
51 HAVAL - A One-Way Hashing Algorithm with Variable Length of Output – Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry - 1993
725 Pseudo-Random Generation from One-Way Functions – Johan Håstad, Russell Impagliazzo, Leonid A. Levin, Michael Luby - 1988
331 New Hash Functions and Their Use in Authentication and Set Equality – M N Wegman, J L Carter - 1981
16 A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damg˚ard’s One-Way Function Based on a Cellular Automaton – Joan Daemen, René Govaerts, Joos V, Laboratorium Esat - 1993
96 Collision free hash functions and public key signature scheme,” Lecture – I B Damgård
7 Duality between two cryptographic primitives – Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai - 1990
28 How to Swindle Rabin – Gideon Yuval - 1979
10 B.: Fast and secure hashing based on codes – L Knudsen, Preneel
150 Cellular Automata and Complexity – S Wolfram - 1994
9 One-Dimensional Linear Hybrid Cellular Automata: Their Synthesis, Properties, and Applications in VLSI Testing – K. Cattell, S. Zhang, X. Sun, M. Serra, J. C. Muzio, D. M. Miller - 1996
30 Additive cellular automata theory and its application i, ieee computer society press – P Pal Chaudhuri, D Roy Chowdhury, S Nandi, S Chattopadhyay - 2000
513 Theory and Application of Trapdoor Functions – A C Yao - 1982
12 The Application of Digital Signatures Based on PublicKey Cryptosystems – D W Davies, W L Price - 1980
11 On the design of provably-secure cryptographic hash functions – A De Santis, M Yung - 1990
493 Differential Cryptanalysis of DES-like Cryptosystems – Eli Biham, Adi Shamir - 1991