Domain Extender for Collision Resistant Hash Functions Using a Directed Acyclic Graph (2003)

by Palash Sarkar
Citations:3 - 0 self

Active Bibliography

Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
595 Practical Byzantine Fault Tolerance – Miguel Castro, Barbara Loskov
503 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
835 Mitigating Routing Misbehavior in Mobile Ad Hoc Networks – Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker - 2000
545 The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks – Frank Stajano, Ross Anderson - 1999
642 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
828 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
1132 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983