To search, Click below search items.
All Published Papers Search Service
Title
A Secure Hash Algorithm with only 8 Folded SHA-1 Steps
Author
Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
Vol. 6 No. 10 pp. 194-205
Keywords
SHA-1, SHA-2, hash, quasigroup folding
Adding MAC Functionality to Edon80
Danilo Gligoroski, Svein J. Knapskog
Vol. 7 No. 1 pp. 194-204
Synchronous stream cipher, MAC, Edon80
On Deviations of the AES S-box when Represented as Vector Valued Boolean Function
Danilo Gligoroski, Marie Elisabeth Gaup Moe
Vol. 7 No. 4 pp. 156-163
AES, S-box, cryptanalysis, algebraic presentation.
Alternative Data Streams in NTFS ? A Gateway for Subverting Endpoint Security Systems
Nenad Stojanovski, Danilo Gligoroski, Svein J. Knapskog
Vol. 7 No. 12 pp. 71-75
NTFS, Alternative Data Streams, Subversion, Endpoint Security Systems