REFERENCES

E. BIHAM AND R. CHEN, “Near-Collisions of SHA-0,” Proceedings CRYPTO 2004, Springer-Verlag, New York, NY, 2004, pp. 290–305.

M. BLUM, “How to Exchange (Secret) Keys,” ACM Transactions on Computer Systems, 1, 175–193 (1983).

B. DEN BOER AND A. BOSSELAERS, “Collisions for the Compression Function of MD5,” EUROCRYPT 1993, Lofthus, Norway, pp. 293–304.

F. CHABAUD AND A. JOUX, “Differential Collisions in SHA-0,” Proceedings of CRYPTO 1998, Springer-Verlag, New York, NY, 1998, pp. 5671.

W. H. Diffie AND M. HELLMAN, “Multiuser Cryptographic Techniques,” National Computer Conference, New York, NY, 1976a, pp. 109–112.

W. H. DIFFIE AND M. HELLMAN, “New Directions in Cryptography,” IEEE Transactions in Information Theory, IT-22, 644–654 (1976b).

H. DOBBERTIN, “Cryptanalysis of MD5 Compress,” Announcement on Internet, [www.ornl.gov/dunigan/md5crack.ps], May 1996a.

H. DOBBERTIN, “The Status of MD5 After a Recent Attack,” CryptoBytes, 2, 1996b.

“Proposed Federal Information Processing Standard for Digital Signature Standard (DSS),” Federal Register, 56(169), 30.

National Institute of Standards and Technology, NIST FIPS PUB 186, “Digital Signature Standard,” U.S. Department of Commerce, US government, May 1994.

T. ELGAMAL, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Advances in Cryptology – CRYPTO ’84, Berlin, Springer-Verlag, New York, NY, 1985, pp. 101–108.

T. ELGAMAL, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” ...

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.