Cryptology ePrint Archive: Report 2005/430

Available versions in chronological order


A New Hash Construction and a Specific Instance Dolly
Duo Lei and Da Lin and Li Chao

A New Hash Construction and a Specific Instance Dolly
Duo Lei and Da Lin and Li Chao

A New Hash Construction and a Specific Instance Dolly
Duo Lei and Da Lin and Li Chao

A New Hash Construction and a Specific Instance Dolly
Duo Lei and Da Lin and Li Chao

A New Hash Construction and a Specific Instance Dolly
Duo Lei and Da Lin and Li Chao

A New Hash Construction and a Specific Instance Dolly
Duo Lei and Da Lin and Li Chao

A New Hash Construction and a Specific Instance Dolly
Duo Lei and Da Lin and Li Chao

A New Hash Construction and a Specific Instance Dolly
Duo Lei and Da Lin and Li Chao

A New Hash Construction and a Specific Instance Dolly
Duo Lei

Can Feistel Cipher be used to build Hash Function
Duo Lei

Can Feistel Cipher be used to build Hash Function
Duo Lei

Can Feistel Cipher be used to build Hash Function
Duo Lei

Can Feistel Cipher be used to build Hash Function
Duo Lei

F-HASH: Securing Hash Functions Using Feistel Chaining
Duo Lei

F-HASH: Securing Hash Functions Using Feistel Chaining
Duo Lei

F-HASH: Securing Hash Functions Using Feistel Chaining
Duo Lei

F-HASH: Securing Hash Functions Using Feistel Chaining
Duo Lei

F-HASH: Securing Hash Functions Using Feistel Chaining
Duo Lei


[ Cryptology ePrint archive ]