Cryptographic hash functions
- 1 July 1994
- journal article
- research article
- Published by Wiley in European Transactions on Telecommunications
- Vol. 5 (4) , 431-448
- https://doi.org/10.1002/ett.4460050406
Abstract
No abstract availableKeywords
This publication has 37 references indexed in Scilit:
- Discrete logarithm hash function that is collision free and one wayIEE Proceedings E Computers and Digital Techniques, 1991
- Cryptanalysis of a fast cryptographic checksum algorithmComputers & Security, 1990
- Multi-destination secure electronic mailThe Computer Journal, 1989
- Some weak points of one fast cryptographic checksum algorithm and its improvementComputers & Security, 1988
- A cryptographic checksum for integrity protectionComputers & Security, 1987
- Implementing the RSA cryptosystemComputers & Security, 1987
- Sealing electronic money in SwedenComputers & Security, 1982
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976