analysis of zipper as a hash function
文献类型:会议论文
作者 | Lin Pin ; Wu Wenling ; Wu Chuankun ; Qiu Tian |
出版日期 | 2008 |
会议名称 | 4th Information Security Practice and Experience Conference (ISPEC 2008) |
会议日期 | APR 21-23, |
会议地点 | Sydney, AUSTRALIA |
关键词 | Zipper hash function compression function |
页码 | 392-403 |
英文摘要 | At CRYPTO 2005, Coron etc. proposed several modified methods to make the usual hash functions based on MD method indifferentiable from random oracles. However, the compression functions used in Corons schemes are supposed to be random oracles. |
会议录 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
![]() |
会议录出版者 | INFORMATION SECURITY PRACTICE AND EXPERIENCE |
会议录出版地 | HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY |
ISSN号 | 0302-9743 |
ISBN号 | 978-3-540-79103-4 |
源URL | [http://124.16.136.157/handle/311060/10654] ![]() |
专题 | 软件研究所_信息安全国家重点实验室_会议论文 |
推荐引用方式 GB/T 7714 | Lin Pin,Wu Wenling,Wu Chuankun,et al. analysis of zipper as a hash function[C]. 见:4th Information Security Practice and Experience Conference (ISPEC 2008). Sydney, AUSTRALIA. APR 21-23,. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。