2002
DOI: 10.1109/tit.2002.801402
|View full text |Cite
|
Sign up to set email alerts
|

Construction of secure and fast hash functions using nonbinary error-correcting codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2005
2005
2010
2010

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 38 publications
0
23
0
Order By: Relevance
“…The preprocessing function C pre of H is defined by a generator matrix G of the code [5,3,3] 4 . Using the G proposed in [10] and defining ϕ by (that is also the one given in [10] Therefore, given W ∈ {0, 1} 6n , H n computes the digest Z ∈ {0, 1} 5n as follows:…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…The preprocessing function C pre of H is defined by a generator matrix G of the code [5,3,3] 4 . Using the G proposed in [10] and defining ϕ by (that is also the one given in [10] Therefore, given W ∈ {0, 1} 6n , H n computes the digest Z ∈ {0, 1} 5n as follows:…”
Section: Resultsmentioning
confidence: 99%
“…(We use the journal version [10] as our frame of reference). Although their work was ostensibly targeted at blockcipher-based designs, the main technical thread of their work develops a transform that extends the range of an 'ideal' compression function (blockcipher-based, or not) in a manner that delivers some target level of security.…”
Section: The Knudsen-preneel Hash Functionsmentioning
confidence: 99%
See 3 more Smart Citations