Sciweavers

658 search results - page 43 / 132
» The Grindahl Hash Functions
Sort
View
ASIACRYPT
2004
Springer
15 years 3 months ago
The MD2 Hash Function Is Not One-Way
Frédéric Muller
62
Voted
FSE
2010
Springer
147views Cryptology» more  FSE 2010»
15 years 2 months ago
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nan...
69
Voted
FSE
2010
Springer
124views Cryptology» more  FSE 2010»
15 years 2 months ago
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
58
Voted
CCS
1994
ACM
15 years 1 months ago
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms
Paul C. van Oorschot, Michael J. Wiener
52
Voted
EUROCRYPT
1993
Springer
15 years 1 months ago
The Breaking of the AR Hash Function
Ivan Damgård, Lars R. Knudsen