The Classification of Hash Functions (1993)

Cached

Download Links

by Ross Anderson
Citations:24 - 3 self

Active Bibliography

Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
unknown title – Foreword Whitfield Diffie
structures to cryptography – unknown authors - 2009
3 A critical look at cryptographic hash function literature – Scott Contini, Ron Steinfeld, Josef Pieprzyk, Krystian Matusiewicz - 2007
1 Cryptology – Prof Ronald Rivest, L. Rivest
3 Design principles for dedicated hash functions – Bart Preneel - 1994
35 Cryptographic Hash Functions: A Survey – S. Bakhtiari, R. Safavi-naini, J. Pieprzyk, Centre Computer - 1995
278 Security Arguments for Digital Signatures and Blind Signatures – David Pointcheval, Jacques Stern - 2000
2 Group Blind Digital Signatures: Theory and Applications – Ronald L. Rivest, Zulfikar Amin Ramzan, Zulfikar Amin Ramzan - 1999
116 Robustness Principles for Public Key Protocols – Ross Anderson, Roger Needham - 1995
Data Security - CM 0321 – Antonia J. Jones, Antonia J. Jones, Lecturer Antonia, J. Jones - 2001
8 Answers To Frequently Asked Questions About Today's Cryptography – Paul Fahn - 1993
MODULE: Data Security – Antonia J. Jones, Antonia J. Jones, Lecturer Antonia, J. Jones - 1996
9 Hash Functions Based on Block Ciphers and Quaternary Codes – Lars Knudsen, Bart Preneel - 1996
5 On the power of memory in the design of collision resistant hash functions – Bart Preneel, René Govaerts, Joos V, Laboratorium Esat-cosic - 1993
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
Studies in the Efficiency and (versus) Security of Cryptographic Tasks – Mohammad Mahmoody-ghidary
2 Y.: Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2005
7 Towards Practical Lattice-Based Cryptography – Vadim Lyubashevsky - 2008