Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/188105.188183guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Hash functions based on block ciphers: a synthetic approach

Published: 02 January 1994 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology
January 1994
494 pages
ISBN:0387577661

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 02 January 1994

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform securityMultimedia Tools and Applications10.1007/s11042-018-5630-478:3(3107-3130)Online publication date: 1-Feb-2019
  • (2018)Access right management by extended password capabilitiesInternational Journal of Information Security10.1007/s10207-017-0390-017:5(603-612)Online publication date: 1-Oct-2018
  • (2017)A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps3D Research10.1007/s13319-017-0123-18:2(1-15)Online publication date: 1-Jun-2017
  • (2017)Truncated differential based known-key attacks on round-reduced SIMONDesigns, Codes and Cryptography10.1007/s10623-016-0242-383:2(467-492)Online publication date: 1-May-2017
  • (2017)Optimal collision security in double block length hashing with single length keyDesigns, Codes and Cryptography10.1007/s10623-016-0227-283:2(357-406)Online publication date: 1-May-2017
  • (2016)Hash-Function Based PRFsProceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 966510.5555/3081770.3081792(566-595)Online publication date: 8-May-2016
  • (2016)PinTarProceedings of the 4th International Conference on Information and Network Security10.1145/3026724.3026729(34-38)Online publication date: 28-Dec-2016
  • (2016)Improved preimage attacks on hash modes of 8-round AES-256Multimedia Tools and Applications10.1007/s11042-015-2769-075:22(14525-14539)Online publication date: 1-Nov-2016
  • (2016)Efficient parallelizable hashing using small non-compressing primitivesInternational Journal of Information Security10.1007/s10207-015-0288-715:3(285-300)Online publication date: 1-Jun-2016
  • (2016)LinicryptProceedings, Part III, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 981610.1007/978-3-662-53015-3_15(416-445)Online publication date: 14-Aug-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media