[图书][B] Encyclopedia of cryptography and security

HCA Van Tilborg, S Jajodia - 2014 - books.google.com
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography
and Security brings the latest and most comprehensive coverage of the topic: Definitive …

Cryptographic hash functions: Recent design trends and security notions

S Al-Kuwari, JH Davenport, RJ Bradford - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Recent years have witnessed an exceptional research interest in cryptographic hash
functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the …

The first 30 years of cryptographic hash functions and the NIST SHA-3 competition

B Preneel - Cryptographers' track at the RSA conference, 2010 - Springer
The first designs of cryptographic hash functions date back to the late 1970s; more
proposals emerged in the 1980s. During the 1990s, the number of hash function designs …

The hash function family LAKE

JP Aumasson, W Meier, RCW Phan - Fast Software Encryption: 15th …, 2008 - Springer
This paper advocates a new hash function family based on the HAIFA framework, inheriting
built-in randomized hashing and higher security guarantees than the Merkle-Damgård …

Parallel cryptographic hashing: Developments in the last 25 years

N Kishore, P Raina - Cryptologia, 2019 - Taylor & Francis
Parallel computing has led to fundamental changes in almost all research areas associated
with computer science; cryptography is no exception. Besides improved speed and resource …

Cryptographic hash functions: theory and practice

B Preneel - International Conference on Cryptology in India, 2010 - Springer
Cryptographic hash functions are an essential building block for security applications. Until
2005, the amount of theoretical research and cryptanalysis invested in this topic was rather …

Optimization of tree modes for parallel hash functions: A case study

K Atighehchi, R Rolland - IEEE Transactions on Computers, 2017 - ieeexplore.ieee.org
This paper focuses on parallel hash functions based on tree modes of operation for an inner
Variable-Input-Length function. This inner function can be either a single-block-length (SBL) …

Generalized secure hash algorithm: SHA-X

CH Lin, YS Yeh, SP Chien, CY Lee… - 2011 IEEE EUROCON …, 2011 - ieeexplore.ieee.org
This paper defines a generalized SHA algorithm based on the SHA family rules. The
proposed algorithm accepts arbitrary length message as input to generate message digest …

[PDF][PDF] CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique.

P Gauravaram, W Millan, L May - Cryptographic Algorithms and their Uses, 2004 - Citeseer
Most of the currently accepted designs for cryptographic hash functions are in the style of a
block cipher in feed-forward mode. With increasing interest in all forms of cryptanalysis, this …

The state of hash functions and the NIST SHA-3 competition

B Preneel - International Conference on Information Security and …, 2008 - Springer
Cryptographic hash functions play a central role in applications of cryptography. In spite of
this, there has been only limited interest for theoretical work on the definitions and …