The state of cryptographic hash functions

被引:40
作者
Preneel, B [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn, ESAT, B-3001 Heverlee, Belgium
来源
LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE | 1999年 / 1561卷
关键词
D O I
10.1007/3-540-48969-X_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A brief overview is presented of the most important constructions, and some open problems are presented.
引用
收藏
页码:158 / 182
页数:25
相关论文
共 92 条
[11]  
BELLARE M, 1997, LNCS, V1233, P00163, DOI DOI 10.1007/3-540-69053-0
[12]  
Bellare M., 1993, CCS 93, P62
[13]  
Biham E., 1993, DIFFERENTIAL CRYPTAN
[14]  
Boneh D, 1997, LECT NOTES COMPUT SC, V1294, P425
[15]  
BRACHTL BO, 1990, Patent No. 4908861
[16]  
CAMION P, 1991, LECT NOTES COMPUT SC, V547, P39
[17]  
CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
[18]  
Chabaud F, 1998, LECT NOTES COMPUT SC, V1462, P56, DOI 10.1007/BFb0055720
[19]  
CHAUM D, 1992, LECT NOTES COMPUT SC, V576, P470
[20]  
COPPERSMITH D, 1986, LECT NOTES COMPUT SC, V218, P14