Entry Anderson:1996:TFN from lncs1996a.bib
Last update: Mon Mar 13 02:22:27 MDT 2017
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Anderson:1996:TFN,
author = "Ross Anderson and Eli Biham",
title = "{Tiger}: {A} fast new hash function",
journal = j-LECT-NOTES-COMP-SCI,
volume = "1039",
pages = "89--97",
year = "1996",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Feb 08 12:41:43 2006",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs1996a.bib",
URL = "http://www.springerlink.com/link.asp?id=fx0261047446n136;
http://www.springerlink.com/openurl.asp?genre=article&issn=0302-9743&volume=1039&spage=89;
http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/3-540-60865-6_46",
abstract = "Among those cryptographic hash function which are not
based on block ciphers, MD4 and Snefru seemed initially
quite attractive for applications requiring fast
software hashing. However collisions for Snefru were
found in 1990, and recently a collision of MD4 was also
found. This casts doubt on how long these functions'
variants, such as RIPE-MD, MD5, SHA, SHA1 and Snefru-8,
will remain unbroken. Furthermore, all these functions
were designed for 32-bit processors, and cannot be
implemented efficiently on the new generation of 64-bit
processors such as the DEC Alpha. We therefore present
a new hash function which we believe to be secure; it
is designed to run quickly on 64-bit processors,
without being too slow on existing machines.",
acknowledgement = ack-nhfb,
}
Related entries
- all,
1071(0)226,
1086(0)93
- application,
1028(0)115,
1030(0)465,
1031(0)11,
1031(0)51,
1031(0)58,
1031(0)124,
1031(0)331,
1033(0)126,
1034(0)1,
1034(0)102,
1035(0)59,
1035(0)307,
1036(0)368,
1038(0)163,
1041(0)69,
1041(0)278,
1044(0)65,
1044(0)209,
1045(0)45,
1045(0)71,
1045(0)117,
1045(0)131,
1046(0)375,
1051(0)39,
1051(0)60,
1052(0)40,
1052(0)79,
1052(0)99,
1052(0)177,
1052(0)244,
1057(0)131,
1057(0)617,
1061(0)305,
1062(0)118,
1063(0)345,
1064(0)251,
1065(0)272,
1065(0)376,
1067(0)29,
1067(0)106,
1067(0)290,
1067(0)358,
1067(0)485,
1067(0)812,
1067(0)901,
1068(0)157,
1068(0)266,
1069(0)63,
1069(0)135,
1070(0)143,
1071(0)261,
1072(0)13,
1073(0)469,
1075(0)209,
1077(0)73,
1077(0)237,
1079(0)108,
1079(0)202,
1079(0)438,
1080(0)136,
1080(0)514,
1081(0)257,
1085(0)73,
1085(0)126,
1087(0)1,
1088(0)183,
1088(0)235,
1088(0)413,
1090(0)169,
1090(0)209,
1093(0)263,
1094(0)232,
1098(0)91,
1098(0)114,
1098(0)366,
1099(0)219,
1099(0)290,
1099(0)514,
1099(0)538
- based,
1029(0)165,
1030(0)317,
1031(0)51,
1031(0)81,
1031(0)298,
1033(0)254,
1035(0)231,
1035(0)425,
1035(0)561,
1036(0)188,
1037(0)267,
1039(0)159,
1040(0)329,
1044(0)53,
1044(0)239,
1045(0)1,
1046(0)243,
1048(0)137,
1050(0)83,
1052(0)229,
1055(0)427,
1059(0)135,
1061(0)160,
1061(0)285,
1061(0)424,
1063(0)120,
1064(0)107,
1065(0)272,
1065(0)283,
1065(0)540,
1065(0)709,
1067(0)3,
1067(0)283,
1067(0)333,
1067(0)619,
1070(0)49,
1070(0)60,
1071(0)312,
1072(0)69,
1072(0)212,
1073(0)502,
1079(0)128,
1079(0)418,
1080(0)362,
1081(0)200,
1085(0)276,
1086(0)27,
1086(0)66,
1086(0)75,
1086(0)130,
1086(0)550,
1087(0)85,
1091(0)269
- block,
1035(0)129,
1039(0)113,
1039(0)121,
1039(0)205,
1041(0)125,
1067(0)619
- cannot,
1069(0)19
- ciphers,
1039(0)113,
1039(0)159,
1039(0)189,
1039(0)205
- cryptographic,
1029(0)290,
1030(0)465,
1070(0)268
- efficiently,
1057(0)223
- existing,
1040(0)343
- fast,
1027(0)99,
1027(0)447,
1029(0)186,
1029(0)215,
1033(0)191,
1039(0)83,
1039(0)145,
1044(0)161,
1057(0)18,
1057(0)275,
1064(0)157,
1065(0)507,
1067(0)269,
1067(0)333,
1070(0)166,
1070(0)268,
1075(0)168,
1090(0)189,
1090(0)209,
1097(0)296,
1099(0)75,
1099(0)598
- function,
1029(0)144,
1029(0)201,
1030(0)129,
1039(0)51,
1046(0)319,
1046(0)415,
1046(0)543,
1050(0)213,
1051(0)195,
1063(0)54,
1063(0)320,
1065(0)28,
1070(0)268,
1070(0)283,
1070(0)294,
1085(0)1,
1090(0)142,
1090(0)231,
1098(0)142
- generation,
1030(0)447,
1031(0)419,
1033(0)191,
1033(0)318,
1035(0)13,
1036(0)17,
1036(0)47,
1036(0)88,
1036(0)125,
1036(0)205,
1036(0)222,
1036(0)300,
1036(0)331,
1036(0)350,
1036(0)368,
1041(0)267,
1044(0)251,
1055(0)127,
1060(0)160,
1065(0)475,
1067(0)454,
1071(0)143,
1073(0)27,
1081(0)84,
1081(0)109,
1090(0)401,
1090(0)411,
1098(0)114
- hash,
1029(0)201,
1039(0)51,
1057(0)373
- hashing,
1039(0)83,
1046(0)569,
1064(0)59,
1075(0)130
- how,
1027(0)373,
1029(0)115,
1051(0)1,
1057(0)535,
1060(0)121,
1063(0)232,
1070(0)399,
1072(0)286,
1077(0)230,
1085(0)716,
1086(0)493,
1097(0)428
- implemented,
1067(0)905
- long,
1063(0)232
- MD4,
1039(0)53
- new,
1027(0)28,
1027(0)234,
1029(0)105,
1029(0)244,
1033(0)450,
1039(0)205,
1046(0)3,
1050(0)209,
1051(0)140,
1051(0)160,
1054(0)248,
1058(0)280,
1060(0)192,
1062(0)197,
1063(0)120,
1063(0)273,
1066(0)553,
1067(0)571,
1067(0)792,
1070(0)33,
1070(0)166,
1070(0)294,
1070(0)372,
1075(0)141,
1075(0)234,
1077(0)17,
1077(0)193,
1077(0)246,
1081(0)14,
1084(0)389,
1086(0)448,
1091(0)327,
1094(0)124,
1099(0)324
- not,
1035(0)219,
1042(0)127,
1050(0)103,
1080(0)402,
1081(0)159,
1085(0)110,
1088(0)460
- processors,
1067(0)297,
1068(0)108
- run,
1072(0)35
- secure,
1039(0)113,
1045(0)131,
1051(0)214,
1070(0)200,
1070(0)245,
1070(0)256,
1088(0)198
- software,
1030(0)175,
1030(0)181,
1030(0)403,
1031(0)4,
1031(0)21,
1031(0)111,
1031(0)271,
1031(0)298,
1033(0)16,
1045(0)1,
1049(0)190,
1049(0)215,
1051(0)1,
1051(0)595,
1051(0)649,
1055(0)391,
1055(0)417,
1060(0)1,
1060(0)18,
1061(0)249,
1061(0)420,
1067(0)493,
1067(0)508,
1070(0)237,
1072(0)204,
1073(0)155,
1078(0)6,
1078(0)17,
1078(0)33,
1078(0)49,
1078(0)64,
1078(0)103,
1078(0)115,
1080(0)44,
1080(0)362,
1082(0)103,
1086(0)10,
1086(0)28,
1088(0)17,
1088(0)89,
1088(0)101,
1088(0)159,
1091(0)133
- variants,
1085(0)15
- which,
1046(0)465,
1062(0)76,
1064(0)439,
1069(0)1
- will,
1098(0)2