Domain Extender for Collision Resistant Hash Functions Using a Directed Acyclic Graph (2003)

by Palash Sarkar
Citations:3 - 0 self

Active Bibliography

Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
557 Practical Byzantine Fault Tolerance – Miguel Castro, Barbara Loskov
799 Mitigating Routing Misbehavior in Mobile Ad Hoc Networks – Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker - 2000
2980 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
770 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
1227 Untraceable electronic mail, return addresses, and digital pseudonyms – David Chaum, Communications Of The Acm, R. Rivest, David L. Chaum - 1981
501 The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks – Frank Stajano, Ross Anderson - 1999
1813 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001