History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 27 total

RIPEMD family (English)
Encyclopedia of Cryptography and Security (2nd Ed.), 1050-1053 (2011).
1
Md4-md5 (English)
Encyclopedia of Cryptography and Security (2005).
2
RIPEMD family (English)
Encyclopedia of Cryptography and Security (2005).
3
Recent developments in the design of conventional cryptographic algorithms. (English)
Preneel, Bart (ed.) et al., State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997. Revised lectures. Berlin: Springer. Lect. Notes Comput. Sci. 1528, 105-130 (1998).
4
SHA: A design for parallel architectures? (English)
EUROCRYPT, 348-362 (1997).
5
Recent developments in the design of conventional cryptographic algorithms (English)
State of the Art in Applied Cryptography, 105-130 (1997).
6
A fast software implementation for arithmetic operations in $\text{GF}(2^n)$. (English)
Kim, Kwangjo (ed.) et al., Advances in cryptology - ASIACRYPT ’96. International conference on the theory and applications of cryptology and information security, Kyongju, Korea, November 3-7, 1996. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1163, 65-76 (1996).
7
The cipher SHARK (English)
FSE, 99-111 (1996).
8
RIPEMD-160: A strengthened version of RIPEMD (English)
FSE, 71-82 (1996).
9
A fast software implementation for arithmetic operations in $GF(2^{n})$ (English)
ASIACRYPT, 65-76 (1996).
10
Fast hashing on the pentium (English)
CRYPTO, 298-312 (1996).
11
Integrity primitives for secure information systems. Final report of RACE integrity primitives evaluation RIPE-RACE 1040. (English)
Lecture Notes in Computer Science 1007. Berlin: Springer-Verlag (ISBN 3-540-60640-8). 239~p. DM~54.00; öS~394.20; sFr~52.00 (1995).
12
Integrity primitives for secure information systems, final report of RACE integrity primitives evaluation RIPE-RACE 1040 (English)
Lecture Notes in Computer Science 1007 (1995).
13
Collisions for the compression function of MD5. (English)
Helleseth, Tor (ed.), Advances in cryptology - EUROCRYPT ’93. Workshop on the theory and application of cryptographic techniques, Lofthus, Norway, May 23-27, 1993. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 765, 293-304 (1994).
14
Comparison of three modular reduction functions. (English)
Stinson, Douglas R. (ed.), Advances in cryptology - CRYPTO ’93. 13th annual international cryptology conference, Santa Barbara, CA, USA, August 22 - 26, 1993. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 773, 175-186 (1994).
15
The ESPRIT project CAFE - high security digital payment systems (English)
ESORICS, 217-230 (1994).
16
Cryptography within Phase I of the EEC-RACE programme. (English)
Preneel, Bart (ed.) et al., Computer security and industrial cryptography. State of the art and evolution. ESAT course, Leuven, Belgium, May 21-23, 1991. Berlin: Springer-Verlag (ISBN 3-540-57341-0). Lect. Notes Comput. Sci. 741, 227-234 (1993).
17
Collisions for Schnorr’s hash function FFT-hash presented at Crypto ’91. (English)
Imai, Hideki (ed.) et al., Advances in Cryptology - ASIACRYPT ’91. International conference on the theory and application of cryptology, Fujiyoshida, Japan, November 11-14, 1991. Proceedings. Berlin: Springer- Verlag. Lect. Notes Comput. Sci. 739, 477-480 (1993).
18
Collisions for the compressin function of MD5 (English)
EUROCRYPT, 293-304 (1993).
19
Comparison of three modular reduction functions (English)
CRYPTO, 175-186 (1993).
20
first | previous | 1 21 | next | last

Result 1 to 20 of 27 total