To search, Click below search items.
All Published Papers Search Service
Title
A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
Author
Minho Kim, ?etin Kaya Ko?
Vol. 6 No. 5 pp. 157-160
Keywords
Hash function, user authentication, stolen-verifier attack, denial-of-service attack
EPC Tag Authentication with Randomized Characteristics for Strong Privacy
Soohyun Oh, Jin Kwak
Vol. 6 No. 9 pp. 182-186
RFID, privacy, tracking, hash function
Design of a Synchronous Stream Cipher from Hash Functions
Angelo P. E. Rosiello
Vol. 7 No. 8 pp. 69-73
stream cipher, key, keystream, one-time pad cryptosystem, hash function, keyed hash function
FORK-160: A New 160 - bit Software-Oriented Hash Function
Amir Hossein Tabatabaee, Yaser Esmaeili, Mohammad Reza Sohizadeh Abyaneh, Hadi Ahmadi
Vol. 7 No. 9 pp. 177-186
Hash function, collision attack, differential attack, FORK-256