The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
- 1 January 2010
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 70 references indexed in Scilit:
- Preimages for Step-Reduced SHA-2Lecture Notes in Computer Science, 2009
- The Intel AES Instructions Set and the SHA-3 CandidatesLecture Notes in Computer Science, 2009
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1Lecture Notes in Computer Science, 2009
- On the Indifferentiability of the Sponge ConstructionLecture Notes in Computer Science, 2008
- Seven-Property-Preserving Iterated Hashing: ROXPublished by Springer Science and Business Media LLC ,2007
- New Proofs for NMAC and HMAC: Security Without Collision-ResistanceLecture Notes in Computer Science, 2006
- Multi-Property-Preserving Hash Domain Extension and the EMD TransformLecture Notes in Computer Science, 2006
- Incremental Cryptography: The Case of Hashing and SigningPublished by Springer Science and Business Media LLC ,2001
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Differential Cryptanalysis of the Data Encryption StandardPublished by Springer Science and Business Media LLC ,1993