Cryptographic Hash Functions

Publication: ResearchPh.D. thesis – Annual report year: 2009

Standard

Cryptographic Hash Functions. / Thomsen, Søren Steffen; Knudsen, Lars Ramkilde (Supervisor).

2009.

Publication: ResearchPh.D. thesis – Annual report year: 2009

Harvard

APA

CBE

MLA

Vancouver

Author

Thomsen, Søren Steffen; Knudsen, Lars Ramkilde (Supervisor) / Cryptographic Hash Functions.

2009.

Publication: ResearchPh.D. thesis – Annual report year: 2009

Bibtex

@phdthesis{3b412889270f46f59740fbf1ca8cd7e0,
title = "Cryptographic Hash Functions",
author = "Thomsen, {Søren Steffen} and Knudsen, {Lars Ramkilde}",
year = "2009",

}

RIS

TY - BOOK

T1 - Cryptographic Hash Functions

A1 - Thomsen,Søren Steffen

AU - Thomsen,Søren Steffen

A2 - Knudsen,Lars Ramkilde

ED - Knudsen,Lars Ramkilde

PY - 2009/2

Y1 - 2009/2

N2 - Cryptographic hash functions are commonly used in many different areas of cryptography: in digital signatures and in public-key cryptography, for password protection and message authentication, in key derivation functions, in pseudo-random number generators, etc. Recently, cryptographic hash functions have received a huge amount of attention due to new attacks on widely used hash functions. This PhD thesis, having the title "Cryptographic Hash Functions", contains both a general description of cryptographic hash functions, including their applications and expected properties as well as some well-known designs, and also some design and cryptanalysis in which the author took part. The latter includes a construction method for hash functions and four designs, of which one was submitted to the SHA-3 hash function competition, initiated by the U.S. standardisation body NIST. It also includes cryptanalysis of the construction method MDC-2, and of the hash function MD2.

AB - Cryptographic hash functions are commonly used in many different areas of cryptography: in digital signatures and in public-key cryptography, for password protection and message authentication, in key derivation functions, in pseudo-random number generators, etc. Recently, cryptographic hash functions have received a huge amount of attention due to new attacks on widely used hash functions. This PhD thesis, having the title "Cryptographic Hash Functions", contains both a general description of cryptographic hash functions, including their applications and expected properties as well as some well-known designs, and also some design and cryptanalysis in which the author took part. The latter includes a construction method for hash functions and four designs, of which one was submitted to the SHA-3 hash function competition, initiated by the U.S. standardisation body NIST. It also includes cryptanalysis of the construction method MDC-2, and of the hash function MD2.

BT - Cryptographic Hash Functions

ER -