Sciweavers

277 search results - page 9 / 56
» The Whirlpool Secure Hash Function
Sort
View
133
Voted
AC
1997
Springer
15 years 7 months ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
131
Voted
ACISP
2007
Springer
15 years 9 months ago
On Building Hash Functions from Multivariate Quadratic Equations
Recent advances in hash functions cryptanalysis provide a strong impetus to explore new designs. This paper describes a new hash function mq-hash that depends for its security on t...
Olivier Billet, Matthew J. B. Robshaw, Thomas Peyr...
155
Voted
PKC
1998
Springer
158views Cryptology» more  PKC 1998»
15 years 7 months ago
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
91
Voted
CCS
1994
ACM
15 years 7 months ago
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms
Paul C. van Oorschot, Michael J. Wiener
127
Voted
MMSEC
2005
ACM
113views Multimedia» more  MMSEC 2005»
15 years 8 months ago
A secure biometric authentication scheme based on robust hashing
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one-way tra...
Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon