The state of cryptographic hash functions

被引:40
作者
Preneel, B [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, ESAT, B-3001 Heverlee, Belgium
来源
LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE | 1999年 / 1561卷
关键词
D O I
10.1007/3-540-48969-X_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.
引用
收藏
页码:158 / 182
页数:25
相关论文
共 92 条
[1]  
Aiello W, 1998, LECT NOTES COMPUT SC, V1372, P150
[2]  
Aiello W, 1996, LECT NOTES COMPUT SC, V1070, P307
[3]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[4]  
Anderson R.J., 1996, LNCS, V1039, P89
[5]  
[Anonymous], 1994, LNCS
[6]  
[Anonymous], 1994, Int, V4, P368, DOI 10.1007/bf01622200
[7]  
[Anonymous], 1992, LNCS
[8]  
[Anonymous], IBM TECH DISCL B
[9]   Pseudorandom functions revisited: The cascade construction and its concrete security [J].
Bellare, M ;
Canetti, R ;
Krawczyk, H .
37TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1996, :514-523
[10]  
Bellare M, 1997, LECT NOTES COMPUT SC, V1294, P470