Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-5
|
Results: 5
ATTACKS ON FAST DOUBLE BLOCK LENGTH HASH FUNCTIONS
Authors:
KNUDSEN LR LAI XJ PRENEEL B
Citation:
Lr. Knudsen et al., ATTACKS ON FAST DOUBLE BLOCK LENGTH HASH FUNCTIONS, Journal of cryptology, 11(1), 1998, pp. 59-72
MACDES - MAC ALGORITHM-BASED ON DES
Authors:
KNUDSEN LR PRENEEL B
Citation:
Lr. Knudsen et B. Preneel, MACDES - MAC ALGORITHM-BASED ON DES, Electronics Letters, 34(9), 1998, pp. 871-873
SECURITY ANALYSIS OF THE MESSAGE AUTHENTICATOR ALGORITHM (MAA)
Authors:
PRENEEL B RIJMEN V VANOORSCHOT PC
Citation:
B. Preneel et al., SECURITY ANALYSIS OF THE MESSAGE AUTHENTICATOR ALGORITHM (MAA), European transactions on telecommunications, 8(5), 1997, pp. 455-470
KEY RECOVERY ATTACK ON ANSI X9.19 RETAIL MAC
Authors:
PRENEEL B VANOORSCHOT PC
Citation:
B. Preneel et Pc. Vanoorschot, KEY RECOVERY ATTACK ON ANSI X9.19 RETAIL MAC, Electronics Letters, 32(17), 1996, pp. 1568-1569
CRYPTOGRAPHIC HASH FUNCTIONS
Authors:
PRENEEL B
Citation:
B. Preneel, CRYPTOGRAPHIC HASH FUNCTIONS, European transactions on telecommunications and related technologies, 5(4), 1994, pp. 431-448
Risultati:
1-5
|