Advanced Search
Volume 19 Issue 6
Nov.  1997
Turn off MathJax
Article Contents
Zhu Huafei, Xiao Guozhen, Wang Xinmei. THE CONSTRUCTION AND SECURITY ANALYSIS OF HASH ALGORITHM BASED ON STRONG ONE-WAY PERMUTATION[J]. Journal of Electronics & Information Technology, 1997, 19(6): 810-813.
Citation: Zhu Huafei, Xiao Guozhen, Wang Xinmei. THE CONSTRUCTION AND SECURITY ANALYSIS OF HASH ALGORITHM BASED ON STRONG ONE-WAY PERMUTATION[J]. Journal of Electronics & Information Technology, 1997, 19(6): 810-813.

THE CONSTRUCTION AND SECURITY ANALYSIS OF HASH ALGORITHM BASED ON STRONG ONE-WAY PERMUTATION

  • Received Date: 1996-02-05
  • Rev Recd Date: 1997-01-15
  • Publish Date: 1997-11-19
  • This paper constructs the Hash algorithm based on strong one-way permutation by the composition of one-way permutation and perfect permutation on n and proves that its security is equivalent to the one-way permutation that can not be inversed in polynomial time.
  • loading
  • Pieprzyk J, Sadeghiyan B. Design of Hashing Algorithm. Berlin Heidelberg: Springer-Verlag, 1993: 132-169.[2]Webster A F.[J].Tavares S E. On The Design of S-Boxes. Advances in Cryptology-CRYPTO85, Santa Barbara: 1985, Berlin Heidelberg: Springer-Verlag.1986,:-[3]Preneel B, Govaerts R, Bandewalle J. Information Authentication: Hash Functions and Digital Signatures. Computer Security and Industrial Cryptology, State of the EAST curse, Leuven 1991, Berlin Heidelberg: Springer-Verlag, 1993: 88-130.X Lai; Massey J L. Hash Function Based on Block Ciphers. Advances in Cryptology-EUROCRYPT92. Balatonfured: 1992, Berlin Heidelberg: Springer-Verlag, 1993, 50-70.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2052) PDF downloads(411) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return