Djurasevic, Marko; Jakobovic, Domagoj; Mariot, Luca; Picek, Stjepan A survey of metaheuristic algorithms for the design of cryptographic Boolean functions. (English) Zbl 07778089 Cryptogr. Commun. 15, No. 6, 1171-1197 (2023). MSC: 94D10 94A60 90C59 PDFBibTeX XMLCite \textit{M. Djurasevic} et al., Cryptogr. Commun. 15, No. 6, 1171--1197 (2023; Zbl 07778089) Full Text: DOI arXiv OA License
Shi, Jinjing; Lu, Yuhu; Feng, Yanyan; Huang, Duan; Lou, Xiaoping; Li, Qin; Shi, Ronghua A quantum hash function with grouped coarse-grained boson sampling. (English) Zbl 1508.81738 Quantum Inf. Process. 21, No. 2, Paper No. 73, 17 p. (2022). MSC: 81P94 PDFBibTeX XMLCite \textit{J. Shi} et al., Quantum Inf. Process. 21, No. 2, Paper No. 73, 17 p. (2022; Zbl 1508.81738) Full Text: DOI
Mesnager, Sihem; Mandal, Bimal; Tang, Chunming New characterizations and construction methods of bent and hyper-bent Boolean functions. (English) Zbl 1460.94102 Discrete Math. 343, No. 11, Article ID 112081, 11 p. (2020). MSC: 94D10 11T71 PDFBibTeX XMLCite \textit{S. Mesnager} et al., Discrete Math. 343, No. 11, Article ID 112081, 11 p. (2020; Zbl 1460.94102) Full Text: DOI
Yang, Yu-Guang; Bi, Jing-Lin; Li, Dan; Zhou, Yi-Hua; Shi, Wei-Min Hash function based on quantum walks. (English) Zbl 1433.81070 Int. J. Theor. Phys. 58, No. 6, 1861-1873 (2019). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{Y.-G. Yang} et al., Int. J. Theor. Phys. 58, No. 6, 1861--1873 (2019; Zbl 1433.81070) Full Text: DOI
Yang, Yu-Guang; Bi, Jing-Lin; Chen, Xiu-Bo; Yuan, Zheng; Zhou, Yi-Hua; Shi, Wei-Min Simple hash function using discrete-time quantum walks. (English) Zbl 1448.81296 Quantum Inf. Process. 17, No. 8, Paper No. 189, 19 p. (2018). MSC: 81P94 60G50 81U05 PDFBibTeX XMLCite \textit{Y.-G. Yang} et al., Quantum Inf. Process. 17, No. 8, Paper No. 189, 19 p. (2018; Zbl 1448.81296) Full Text: DOI
Andreeva, Elena; Mennink, Bart; Preneel, Bart Open problems in hash function security. (English) Zbl 1356.94047 Des. Codes Cryptography 77, No. 2-3, 611-631 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Andreeva} et al., Des. Codes Cryptography 77, No. 2--3, 611--631 (2015; Zbl 1356.94047) Full Text: DOI Link
Guo, Jian; Su, Chunhua; Yap, Wun-She An improved preimage attack against HAVAL-3. (English) Zbl 1320.94065 Inf. Process. Lett. 115, No. 2, 386-393 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Guo} et al., Inf. Process. Lett. 115, No. 2, 386--393 (2015; Zbl 1320.94065) Full Text: DOI
Wang, Gao-Li Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD. (English) Zbl 1280.94098 J. Comput. Sci. Technol. 28, No. 1, 129-143 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{G.-L. Wang}, J. Comput. Sci. Technol. 28, No. 1, 129--143 (2013; Zbl 1280.94098) Full Text: DOI
Zhang, Wenying; Li, Yanyan; Wu, Lei A new one-bit difference collision attack on HAVAL-128. (English) Zbl 1270.94063 Sci. China, Inf. Sci. 55, No. 11, 2521-2529 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Zhang} et al., Sci. China, Inf. Sci. 55, No. 11, 2521--2529 (2012; Zbl 1270.94063) Full Text: DOI Link
Sasaki, Yu Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. (English) Zbl 1279.94114 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 1-18 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 7118, 1--18 (2012; Zbl 1279.94114) Full Text: DOI
Aumasson, Jean-Philippe; Meier, Willi; Mendel, Florian Preimage attacks on 3-pass HAVAL and step-reduced MD5. (English) Zbl 1256.94041 Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 120-135 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-P. Aumasson} et al., Lect. Notes Comput. Sci. 5381, 120--135 (2009; Zbl 1256.94041) Full Text: DOI
Aoki, Kazumaro; Sasaki, Yu Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. (English) Zbl 1252.94043 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 70-89 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Aoki} and \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 5677, 70--89 (2009; Zbl 1252.94043) Full Text: DOI
Sasaki, Yu Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. (English) Zbl 1307.94093 Samarati, Pierangela (ed.) et al., Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). Lecture Notes in Computer Science 5735, 79-94 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 5735, 79--94 (2009; Zbl 1307.94093) Full Text: DOI
Wang, Gaoli; Wang, Shaohui Second preimage attack on 5-pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-pass HAVAL. (English) Zbl 1246.94041 Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 1-13 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Wang} and \textit{S. Wang}, Lect. Notes Comput. Sci. 5580, 1--13 (2009; Zbl 1246.94041) Full Text: DOI
Sasaki, Yu; Aoki, Kazumaro Preimage attacks on 3, 4, and 5-pass HAVAL. (English) Zbl 1206.94089 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 253-271 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sasaki} and \textit{K. Aoki}, Lect. Notes Comput. Sci. 5350, 253--271 (2008; Zbl 1206.94089) Full Text: DOI
Lee, Eunjin; Chang, Donghoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL. (English) Zbl 1154.68398 Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 189-206 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{E. Lee} et al., Lect. Notes Comput. Sci. 5086, 189--206 (2008; Zbl 1154.68398) Full Text: DOI
Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jaesang; Moon, Dukjae; Chee, Sungtaek A new dedicated 256-bit hash function: FORK-256. (English) Zbl 1186.94446 Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 195-209 (2006). MSC: 94A60 68P25 68N99 PDFBibTeX XMLCite \textit{D. Hong} et al., Lect. Notes Comput. Sci. 4047, 195--209 (2006; Zbl 1186.94446) Full Text: DOI
Yu, Hongbo; Wang, Xiaoyun; Yun, Aaram; Park, Sangwoo Cryptanalysis of the full HAVAL with 4 and 5 passes. (English) Zbl 1234.94071 Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 89-110 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Yu} et al., Lect. Notes Comput. Sci. 4047, 89--110 (2006; Zbl 1234.94071) Full Text: DOI
Kim, Jongsung; Biryukov, Alex; Preneel, Bart; Hong, Seokhie On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. (Extended abstract). (English) Zbl 1152.94428 De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 242-256 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Kim} et al., Lect. Notes Comput. Sci. 4116, 242--256 (2006; Zbl 1152.94428) Full Text: DOI
Chang, Donghoon; Gupta, Kishan Chand; Nandi, Mridul RC4-Hash: A new hash function based on RC4. (Extended abstract). (English) Zbl 1175.94069 Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 80-94 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Chang} et al., Lect. Notes Comput. Sci. 4329, 80--94 (2006; Zbl 1175.94069) Full Text: DOI
Matusiewicz, Krystian; Pieprzyk, Josef Finding good differential patterns for attacks on SHA-1. (English) Zbl 1151.94545 Ytrehus, Øyvind (ed.), Coding and cryptography. International workshop, WCC 2005, Bergen, Norway, March 14–18, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-35481-6/pbk). Lecture Notes in Computer Science 3969, 164-177 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Matusiewicz} and \textit{J. Pieprzyk}, Lect. Notes Comput. Sci. 3969, 164--177 (2006; Zbl 1151.94545) Full Text: DOI
Daum, Magnus Cryptanalysis of hash functions on the MD4-family. (English) Zbl 1189.94003 Bochum: Univ. Bochum, Fakultät für Mathematik (Diss.). 178 p. (2005). MSC: 94-02 94A60 PDFBibTeX XMLCite \textit{M. Daum}, Cryptanalysis of hash functions on the MD4-family. Bochum: Univ. Bochum, Fakultät für Mathematik (Diss.) (2005; Zbl 1189.94003)
Wang, Xiaoyun; Yu, Hongbo How to break MD5 and other hash functions. (English) Zbl 1137.94359 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 19-35 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Wang} and \textit{H. Yu}, Lect. Notes Comput. Sci. 3494, 19--35 (2005; Zbl 1137.94359) Full Text: DOI
Wang, Xiaoyun; Lai, Xuejia; Feng, Dengguo; Chen, Hui; Yu, Xiuyuan Cryptanalysis of the hash functions MD4 and RIPEMD. (English) Zbl 1137.94358 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 1-18 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Wang} et al., Lect. Notes Comput. Sci. 3494, 1--18 (2005; Zbl 1137.94358) Full Text: DOI
Kim, Jongsung; Biryukov, Alex; Preneel, Bart; Lee, Sangjin On the security of encryption modes of MD4, MD5 and HAVAL. (English) Zbl 1122.94379 Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 147-158 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Kim} et al., Lect. Notes Comput. Sci. 3783, 147--158 (2005; Zbl 1122.94379) Full Text: DOI
Yoshida, Hirotaka; Biryukov, Alex; De Cannière, Christophe; Lano, Joseph; Preneel, Bart Non-randomness of the full 4 and 5-pass HAVAL. (English) Zbl 1116.94339 Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 324-336 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Yoshida} et al., Lect. Notes Comput. Sci. 3352, 324--336 (2005; Zbl 1116.94339) Full Text: DOI
Chang, Donghoon; Sung, Jaechul; Sung, Soohak; Lee, Sangjin; Lim, Jongin Full-round differential attack on the original version of the hash function proposed at PKC’98. (English) Zbl 1066.94539 Nyberg, Kaisa (ed.) et al., Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15–16, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00622-2/pbk). Lect. Notes Comput. Sci. 2595, 160-174 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Chang} et al., Lect. Notes Comput. Sci. 2595, 160--174 (2003; Zbl 1066.94539) Full Text: Link
Han, Daewan; Park, Sangwoo; Chee, Seongtaek Cryptanalysis of the modified version of the hash function proposed at PKC’98. (English) Zbl 1045.94520 Daemen, Joan (ed.) et al., Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers. Berlin: Springer (ISBN 3-540-44009-7). Lect. Notes Comput. Sci. 2365, 252-262 (2002). MSC: 94A60 68P25 68N99 PDFBibTeX XMLCite \textit{D. Han} et al., Lect. Notes Comput. Sci. 2365, 252--262 (2002; Zbl 1045.94520) Full Text: Link
Filiol, Eric A new statistical testing for symmetric ciphers and hash functions. (English) Zbl 1023.94523 Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 342-353 (2002). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Filiol}, Lect. Notes Comput. Sci. 2513, 342--353 (2002; Zbl 1023.94523) Full Text: Link
Park, Sangwoo; Sung, Soo Hak; Chee, Seongtaek; Lim, Jongin On the security of reduced versions of 3-pass HAVAL. (English) Zbl 1024.94513 Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 406-419 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Park} et al., Lect. Notes Comput. Sci. 2384, 406--419 (2002; Zbl 1024.94513) Full Text: Link
Park, Nan Kyoung; Hwang, Joon Ho; Lee, Pil Joong HAS-V: A new hash function with variable output length. (English) Zbl 0981.94504 Stinson, Douglas R. (ed.) et al., Selected areas in cryptography. 7th annual international workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2012, 202-216 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{N. K. Park} et al., Lect. Notes Comput. Sci. 2012, 202--216 (2001; Zbl 0981.94504) Full Text: Link
Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki Unconditionally secure digital signature schemes admitting transferability. (English) Zbl 0980.94025 Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 130-142 (2000). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 1976, 130--142 (2000; Zbl 0980.94025)
Pointcheval, David; Stern, Jacques Security arguments for digital signatures and blind signatures. (English) Zbl 1025.94015 J. Cryptology 13, No. 3, 361-396 (2000). Reviewer: Jan Camenisch (Rüschlikon) MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{D. Pointcheval} and \textit{J. Stern}, J. Cryptology 13, No. 3, 361--396 (2000; Zbl 1025.94015) Full Text: DOI
Hsieh, Tsu-Miin; Yeh, Yi-Shiung; Lin, Chu-Hsing; Tuan, Ssu-Heng One-way hash functions with changeable parameters. (English) Zbl 1072.94515 Inf. Sci. 118, No. 1-4, 223-239 (1999). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T.-M. Hsieh} et al., Inf. Sci. 118, No. 1--4, 223--239 (1999; Zbl 1072.94515) Full Text: DOI
Preneel, Bart Cryptographic primitives for information authentication – State of the art. (English) Zbl 0954.94018 Preneel, Bart (ed.) et al., State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997. Revised lectures. Berlin: Springer. Lect. Notes Comput. Sci. 1528, 49-104 (1998). MSC: 94A62 94-02 94A60 PDFBibTeX XMLCite \textit{B. Preneel}, Lect. Notes Comput. Sci. 1528, 49--104 (1998; Zbl 0954.94018)
Shin, Sang Uk; Rhee, Kyung Hyune; Ryu, Dae Hyun; Lee, Sang Jin A new hash function based on MDx-family and its application to MAC. (English) Zbl 1067.94564 Imai, Hideki (ed.) et al., Public key cryptography. 1st international workshop on practice and theory in public key cryptography, PKC ’98, Pacifico Yokohama, Japan, February 5–6, 1998. Proceedings. Berlin: Springer (ISBN 3-540-64693-0). Lect. Notes Comput. Sci. 1431, 234-246 (1998). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. U. Shin} et al., Lect. Notes Comput. Sci. 1431, 234--246 (1998; Zbl 1067.94564) Full Text: Link
Mihaljević, Miodrag; Zheng, Yuliang; Imai, Hideki A cellular automaton based fast one-way hash function suitable for hardware implementation. (English) Zbl 1067.94552 Imai, Hideki (ed.) et al., Public key cryptography. 1st international workshop on practice and theory in public key cryptography, PKC ’98, Pacifico Yokohama, Japan, February 5–6, 1998. Proceedings. Berlin: Springer (ISBN 3-540-64693-0). Lect. Notes Comput. Sci. 1431, 217-233 (1998). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Mihaljević} et al., Lect. Notes Comput. Sci. 1431, 217--233 (1998; Zbl 1067.94552) Full Text: Link
Preneel, Bart Design principles for dedicated hash functions. (English) Zbl 0943.94524 Anderson, Ross (ed.), Fast software encryption. FSE ’93. Cambridge, GB, December 9-11, 1993. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 809, 71-82 (1994). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Preneel}, Lect. Notes Comput. Sci. 809, 71--82 (1994; Zbl 0943.94524) Full Text: DOI
Preneel, Bart; Govaerts, René; Vandewalle, Joos Information authentication: Hash functions and digital signatures. (English) Zbl 1044.94545 Preneel, Bart (ed.) et al., Computer security and industrial cryptography. State of the art and evolution. ESAT course, Leuven, Belgium, May 21-23, 1991. Berlin: Springer-Verlag (ISBN 3-540-57341-0). Lect. Notes Comput. Sci. 741, 87-131 (1993). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{B. Preneel} et al., Lect. Notes Comput. Sci. 741, 87--131 (1993; Zbl 1044.94545)
Preneel, Bart; Govaerts, René; Vandewalle, Joos On the power of memory in the design of collision resistant hash functions. (English) Zbl 0869.94023 Seberry, Jennifer (ed.) et al., Advances in cryptology - AUSCRYPT ’92. Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 718, 105-121 (1993). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Preneel} et al., Lect. Notes Comput. Sci. 718, 105--121 (1993; Zbl 0869.94023)
Zheng, Yuliang; Pieprzyk, Josef; Seberry, Jennifer HAVAL – a one-way hashing algorithm with variable length of output. (Extended abstract). (English) Zbl 0869.94028 Seberry, Jennifer (ed.) et al., Advances in cryptology - AUSCRYPT ’92. Workshop on the theory and application of cryptographic techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 718, 83-104 (1993). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Zheng} et al., Lect. Notes Comput. Sci. 718, 83--104 (1993; Zbl 0869.94028)