A high speed manipulation detection code
Proceedings on Advances in cryptology---CRYPTO '86
A cryptographic checksum for integrity protection
Computers and Security
Fast RSA-hardware: dream or reality
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Some weak points of one fast cryptographic checksum algorithm and its improvement
Computers and Security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
One Way Hash Functions and DES
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A Survey of Hardware Implementation of RSA (Abstract)
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Hash-functions using modulo-N operations
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
A critical analysis of the modified cryptographic checksum algorithm of Cohen and Huang points out some weaknesses in the scheme. We show how to exploit these weaknesses with a chosen text attack to derive the first bits of the key. This information suffices to manipulate blocks with a negligible chance of detection.