Amanote Research

Amanote Research

    RegisterSign In

Hash Functions and MAC Algorithms Based on Block Ciphers

Lecture Notes in Computer Science - Germany
doi 10.1007/bfb0024473
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 1997

Authors
B. Preneel
Publisher

Springer Berlin Heidelberg


Related search

Building Provably Secure Block Ciphers From Cryptographic Hash Functions

International Journal of Computer Applications
2020English

The Interpolation Attack on Block Ciphers

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1997English

New Combined Attacks on Block Ciphers

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

On Hash Functions Using Checksums

International Journal of Information Security
Information SystemsRiskComputer NetworksCommunicationsReliabilitySafetyQualitySoftware
2009English

HDL Design and Verification of Hash Based Authentication Algorithms

International Journal for Research in Applied Science and Engineering Technology
2017English

Parameterized Hash Functions

Annales UMCS, Informatica
2012English

Algebraic Cryptanalysis of Block Ciphers

2019English

Cryptographic Hash Functions

2010English

On Key Schedule for Block Ciphers Without Week Keys

Prikladnaya diskretnaya matematika. Prilozhenie
2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy