Sciweavers

ASIACRYPT
1992
Springer
13 years 8 months ago
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry
ASIACRYPT
1992
Springer
13 years 8 months ago
An Attack on Two Hash Functions by Zheng-Matsumoto-Imai
In [ZMI89,ZMI90] two constructions for a collision resistant hash function were proposed. The first scheme is based on a block cipher, and the second scheme uses modular arithmetic...
Bart Preneel, René Govaerts, Joos Vandewall...
ASIACRYPT
1992
Springer
13 years 8 months ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
ASIACRYPT
1992
Springer
13 years 8 months ago
Nonperfect Secret Sharing Schemes
: Nonperfect secret sharing schemes NSSs have an advantage such that the size of shares can be shorter than that of perfect secret sharing schemes. This paper shows some basic prop...
Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
ASIACRYPT
1992
Springer
13 years 8 months ago
Cryptanalysis of LOKI91
In this paper we examine the redesign of LOKI, LOKI91 proposed in 5 . First it is shown that there is no characteristic with a
Lars R. Knudsen
ASIACRYPT
1992
Springer
13 years 8 months ago
Practical Proven Secure Authentication with Arbitration
Yvo Desmedt, Jennifer Seberry