The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for MD4 with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-1998 (17) 2001-2005 (19) 2006-2007 (24) 2008-2009 (16) 2010-2017 (15) 2018-2022 (4)
Publication types (Num. hits)
article(27) incollection(3) inproceedings(64) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 81 occurrences of 38 keywords

Results
Found 95 publication records. Showing 95 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
170Xiaoyun Wang 0001, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu Cryptanalysis of the Hash Functions MD4 and RIPEMD. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
142Hans Dobbertin Cryptanalysis of MD4. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Dedicated hash functions, RIPEMD, Dedicated hash functions, RIPEMD, Collisions, Collisions, Key words, MD5, MD5, MD4, MD4
138Ronald L. Rivest The MD4 Message Digest Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
132Gaëtan Leurent MD4 is Not One-Way. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, preimage, MD4, one-way
132Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path
123Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision
106Christophe Debaert, Henri Gilbert The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
100Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision
99Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Architecture design methodology, MD4-based hash algorithm, SHA1, RIPEMD-160, Iteration bound analysis, DFG (Data Flow Graph) transformation, Throughput optimization, MD5
90Yusuke Naito 0001, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta Improved Collision Attack on MD4 with Probability Almost 1. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
90Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 The Second-Preimage Attack on MD4. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision differential path, weak message, Hash function, second-preimage
90Burton S. Kaliski Jr. The MD4 Message Digest Algorithm (Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
84Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Message Difference for MD4. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Message Difference, Hash Function, Collision Attack, MD4, Local Collision, Differential Path
80Eli Biham New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
74Hongbo Yu, Xiaoyun Wang 0001 Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-collision, multi-near-collision, Hash function, sufficient condition, differential path
64Tim Güneysu, Christof Paar, Sven Schäge Efficient Hash Collision Search Strategies on Special-Purpose Hardware. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crypto Attacks, Hash functions, Special-purpose Hardware
58Martin Schläffer, Elisabeth Oswald Searching for Differential Paths in MD4. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee 0002 On the Security of Encryption Modes of MD4, MD5 and HAVAL. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58Bert den Boer, Antoon Bosselaers An Attack on the Last Two Rounds of MD4. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
52Gaëtan Leurent Message Freedom in MD4 and MD5 Collisions: Application to APOP. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message modification, meaningful collisions, APOP security, Hash function, MD5, MD4
51Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Near-Collision Attacks on MD4: Applied to MD4-Based Protocols. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
51Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
42Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta Bit-Free Collision: Application to APOP Attack. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit-free collision, APOP, hash function, MD5, MD4
42Stephen Pellicer, Yi Pan 0001, Minyi Guo Distributed MD4 Password Hashing with Grid Computing Package BOINC. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Debapratim De, Abishek Kumarasubramanian, Ramarathnam Venkatesan Inversion Attacks on Secure Hash Functions Using satSolvers. Search on Bibsonomy SAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Lars R. Knudsen SMASH - A Cryptographic Hash Function. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Xiaoyun Wang 0001, Hongbo Yu How to Break MD5 and Other Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Lars R. Knudsen, Bart Preneel Fast and Secure Hashing Based on Codes. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
32Antoon Bosselaers, René Govaerts, Joos Vandewalle Fast Hashing on the Pentium. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Pentium processor, Parallel implementation, Software performance, Cryptographic hash functions
32Bert den Boer, Antoon Bosselaers Collisions for the Compressin Function of MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
26Oleg Zaikin 0002 Inverting 43-step MD4 via Cube-and-Conquer. Search on Bibsonomy IJCAI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Irina Gribanova, Alexander A. Semenov Constructing a Set of Weak Values for Full-round MD4 Hash Function. Search on Bibsonomy MIPRO The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Irina Gribanova, Alexander A. Semenov Using Automatic Generation of Relaxation Constraints to Improve the Preimage Attack on 39-step MD4. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
26Irina Gribanova, Alexander A. Semenov Using automatic generation of relaxation constraints to improve the preimage attack on 39-step MD4. Search on Bibsonomy MIPRO The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Yongpeng Zhou, Gaoli Wang 改进的MD4有意义碰撞攻击 (Improved Meaningful Collision Attack on MD4). Search on Bibsonomy 计算机科学 The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Florian Legendre, Gilles Dequen, Michaël Krajecki Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
26Marko Caric Finding collisions for MD4 hash algorithm using hybrid algorithm. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
26Gaoli Wang Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Yu Sasaki Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Jinmin Zhong, Xuejia Lai Improved preimage attack on one-block MD4. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26 MD4 Hash Function. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Nicky Mouha MD4-MD5. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Sean Turner, Lily Chen MD4 to Historic Status. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Yu Sasaki Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Gaoli Wang Collision Attack for the Hash Function Extended MD4. Search on Bibsonomy ICICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Jinmin Zhong, Xuejia Lai Improved Preimage Attack on One-block MD4. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
26Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
26Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Yu Sasaki, Lei Wang 0031, Noboru Kunihiro, Kazuo Ohta New Message Differences for Collision Attacks on MD4 and MD5. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Kazumaro Aoki, Yu Sasaki Preimage Attacks on One-Block MD4, 63-Step MD5 and More. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Yu Sasaki, Yusuke Naito 0001, Noboru Kunihiro, Kazuo Ohta Improved Collision Attacks on MD4 and MD5. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen Automatic Search of Differential Path in MD4. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
26Hongbo Yu, Xiaoyun Wang 0001 MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
26Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
26Antoon Bosselaers Md4-Md5. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee 0002 On the Security of Encryption Modes of MD4, MD5 and HAVAL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
26Yusuke Naito 0001, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta Improved Collision Attack on MD4. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
26Magnus Daum Cryptanalysis of Hash functions of the MD4-family. Search on Bibsonomy 2005   RDF
26Xiaoyun Wang 0001, Dengguo Feng, Xuejia Lai, Hongbo Yu Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
26Sandra Dominikus A hardware implementation of MD4-family hash algorithms. Search on Bibsonomy ICECS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Hans Dobbertin The First Two Rounds of MD4 are Not One-Way. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26M. Bhaskar Sherigar, A. S. Mahadevan, K. Senthil Kumar, David S. Sumam A Pipelined Parallel Processor to Implement MD4 Message Digest Algorithm on Xilinx FPGA. Search on Bibsonomy VLSI Design The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Hans Dobbertin Cryptanalysis of MD4. Search on Bibsonomy FSE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
26Serge Vaudenay On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. Search on Bibsonomy FSE The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
26Ronald L. Rivest The MD4 Message-Digest Algorithm. Search on Bibsonomy RFC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
26Ronald L. Rivest MD4 Message Digest Algorithm. Search on Bibsonomy RFC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
16Eugene Y. Vasserman, Nicholas Hopper, James Tyra Silent Knock : practical, provably undetectable authentication. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Covert authentication, Cryptography, Provable security, Formal models
16Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
16Yu Sasaki, Kazumaro Aoki Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RIPEMD, double branch, preimage, meet-in-the-middle
16Praveen Gauravaram, Lars R. Knudsen On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Davies-Meyer, RMX, Digital signatures, Hash functions
16Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Analysis of the Hash Function Design Strategy Called SMASH. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Somitra Kumar Sanadhya, Palash Sarkar 0001 Attacking Reduced Round SHA-256. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Christian Rechberger, Vincent Rijmen On Authentication with HMAC and Non-random Properties. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Florian Mendel, Vincent Rijmen Weaknesses in the HAS-V Compression Function. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kazuhiro Suzuki, Kaoru Kurosawa How to Find Many Collisions of 3-Pass HAVAL. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, collision, differential attack, HAVAL
16Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra SilentKnock: Practical, Provably Undetectable Authentication. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ahto Buldas, Sven Laur Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Martin Feldhofer, Christian Rechberger A Case Against Currently Used Hash Functions in RFID Protocols. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Scott Contini, Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Ilya Mironov, Lintao Zhang Applications of SAT Solvers to Cryptanalysis of Hash Functions. Search on Bibsonomy SAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16John Kelsey, Stefan Lucks Collisions and Near-Collisions for Reduced-Round Tiger. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hash function, attack, collisions, Tiger
16Shaoquan Jiang Efficient Primitives from Exponentiation in Zp. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Donghoon Chang, Kishan Chand Gupta, Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash Function, Collision Attack, RC4, Preimage Attack
16Yu Sasaki, Yusuke Naito 0001, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta How to Construct Sufficient Conditions for Hash Functions. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Impact of Rotations in SHA-1 and Related Hash Functions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Breaking a New Hash Function Design Strategy Called SMASH. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, collision
16Dejan Jovanovic, Predrag Janicic Logical Analysis of Hash Functions. Search on Bibsonomy FroCoS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr An FPGA Design of a Unified Hash Engine for IPSec Authentication. Search on Bibsonomy IWSOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle Cryptanalysis of 3-Pass HAVAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee A New Hash Function Based on MDx-Family and Its Application to MAC. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Antoon Bosselaers, René Govaerts, Joos Vandewalle SHA: A Design for Parallel Architectures? Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF multiple-issue architectures, instruction-level parallelism, Cryptographic hash functions, critical path analysis
16Mihir Bellare, Phillip Rogaway Collision-Resistant Hashing: Towards Making UOWHFs Practical. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Bart Preneel, Paul C. van Oorschot MDx-MAC and Building Fast MACs from Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #95 of 95 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license