352
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

A Good Hash Function is Hard to Find, and Vice Versa

Pages 107-119 | Published online: 01 Apr 2013

References

  • Anderson , R. and E. Biham . ( 1996 ). “Tiger: A Fast New Hash Function .” In D. Gollmann , ed., Fast Software Encryption , 3rd International Workshop, Cambridge, UK, 21–23 February. Vol. 1039 of LNCS , Berlin : Springer , pp. 89 – 97 .
  • Barr , T. H. 2001 . Invitation to Cryptology . Upper Saddle River , NJ : Prentice Hall .
  • Diffie , W. and M. E. Hellman . 1976 . “New Directions in Cryptography,” IEEE Transactions on Information Theory , 22 ( 6 ): 644 – 654 .
  • Holden , J. 2004 . “A Comparison of Cryptography Courses,” Cryptologia , 28 ( 2 ): 97 – 111 . doi: 10.1080/0161-110491892809 .
  • Holden , J. 2013 . Demitasse: A Small Version of the Tiny Encryption Algorithm and its Use in a Classroom Setting. Cryptologia , 37 ( 1 ): 74 – 83 .
  • Kelsey , J. , and T. Kohno . 2006 . “Herding Hash Functions and the Nostradamus Attack,” Advances in Cryptology—EUROCRYPT 2006 (Vaudenay, S., ed.), Vol. 4004 of LNCS, Berlin: Springer, pp. 183–200.
  • Meadows , J. 2007 . “Limitations on the Publishing of Scientific Research .” The History of Information Security , edited by K. De Leeuw and J. Bergstra . Amsterdam : Elsevier Science B.V. , pp. 29 – 51 .
  • Musa , M. A. , E. F. Schaefer , and S. Wedig . 2003 . “A Simplified AES Algorithm and its Linear and Differential Cryptanalyses,” Cryptologia , 27 ( 2 ): 148 – 177 . doi: 10.1080/0161-110391891838.
  • Rivest , R. April 1992 . The MD5 Message-Digest Algorithm. Technical Report 1321, Request for Comments, Internet Engineering Task Force. http://tools.ietf.org/html/rfc1321 (accessed 20 February 2013) .
  • Schaefer , E. F. 1996 . “A Simplified Data Encryption Standard Algorithm,” Cryptologia , 20 ( 1 ): 77 – 84 . doi: 10.1080/0161-119691884799 .
  • Stallings , W. 2005 . Cryptography and Network Security, , 4th ed. Upper Saddle River , NJ : Prentice Hall .
  • Stamp , M. 2005 . Information Security: Principles and Practice . Hoboken , NJ : Wiley-Interscience .
  • Stamp , M. and R. M. Low . 2007 . Applied Cryptanalysis: Breaking Ciphers in the Real World . Hoboken , NJ : Wiley-IEEE .
  • Trappe , W. and L. C. Washington . 2005 . Introduction to Cryptography with Coding Theory, , 2nd ed. Upper Saddle River , NJ : Prentice Hall .
  • Turan , M. S. , R. Perlner , L. E. Bassham , W. Burr , D. Chang , S. Chang , M. Dworkin , J. Kelsey , J. M. Paul , and R. Peralta . February 2011 . Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition, Technical Report 7764, NIST Interagency Report, NIST. http: /csrc.nist.gov/groups/ST/hash/sha-3/Round2/documents/Round2_Report_NISTIR_7764.pdf (accessed 20 February 2013) .
  • Van Helden , A. 1974 . “‘Annulo Cingitur’: The Solution to the Problem of Saturn,” Journal for the History of Astronomy , 5 : 155 – 174 .
  • Van Maanen , A. 1926 . “Review: Ouvres Compltes de Christiaan Huygens, Vol. XV,” The Astrophysical Journal , 63 : 375 – 376 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.