Some weak points of one fast cryptographic checksum algorithm and its improvement. Huang, Y. J. & Cohen, F. Computers & Security, 7(5):503-505, 1988.
Link
Paper bibtex @article{journals/compsec/HuangC88,
added-at = {2015-03-25T00:00:00.000+0100},
author = {Huang, Yue Jiang and Cohen, Fred},
biburl = {http://www.bibsonomy.org/bibtex/2e13b1775d1d2889a416eecbbef1f2f25/dblp},
ee = {http://dx.doi.org/10.1016/0167-4048(88)90204-0},
interhash = {19aa2088f37506c5a41038b4c9087895},
intrahash = {e13b1775d1d2889a416eecbbef1f2f25},
journal = {Computers & Security},
keywords = {dblp},
number = 5,
pages = {503-505},
timestamp = {2015-06-18T05:48:40.000+0200},
title = {Some weak points of one fast cryptographic checksum algorithm and its improvement.},
url = {http://dblp.uni-trier.de/db/journals/compsec/compsec7.html#HuangC88},
volume = 7,
year = 1988
}
Downloads: 0
{"_id":"9SF2HRnWAARXfp6tE","bibbaseid":"huang-cohen-someweakpointsofonefastcryptographicchecksumalgorithmanditsimprovement-1988","downloads":0,"creationDate":"2015-12-18T06:38:10.346Z","title":"Some weak points of one fast cryptographic checksum algorithm and its improvement.","author_short":["Huang, Y. J.","Cohen, F."],"year":1988,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/cohen?items=1000","bibdata":{"bibtype":"article","type":"article","added-at":"2015-03-25T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Huang"],"firstnames":["Yue","Jiang"],"suffixes":[]},{"propositions":[],"lastnames":["Cohen"],"firstnames":["Fred"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/2e13b1775d1d2889a416eecbbef1f2f25/dblp","ee":"http://dx.doi.org/10.1016/0167-4048(88)90204-0","interhash":"19aa2088f37506c5a41038b4c9087895","intrahash":"e13b1775d1d2889a416eecbbef1f2f25","journal":"Computers & Security","keywords":"dblp","number":"5","pages":"503-505","timestamp":"2015-06-18T05:48:40.000+0200","title":"Some weak points of one fast cryptographic checksum algorithm and its improvement.","url":"http://dblp.uni-trier.de/db/journals/compsec/compsec7.html#HuangC88","volume":"7","year":"1988","bibtex":"@article{journals/compsec/HuangC88,\n added-at = {2015-03-25T00:00:00.000+0100},\n author = {Huang, Yue Jiang and Cohen, Fred},\n biburl = {http://www.bibsonomy.org/bibtex/2e13b1775d1d2889a416eecbbef1f2f25/dblp},\n ee = {http://dx.doi.org/10.1016/0167-4048(88)90204-0},\n interhash = {19aa2088f37506c5a41038b4c9087895},\n intrahash = {e13b1775d1d2889a416eecbbef1f2f25},\n journal = {Computers & Security},\n keywords = {dblp},\n number = 5,\n pages = {503-505},\n timestamp = {2015-06-18T05:48:40.000+0200},\n title = {Some weak points of one fast cryptographic checksum algorithm and its improvement.},\n url = {http://dblp.uni-trier.de/db/journals/compsec/compsec7.html#HuangC88},\n volume = 7,\n year = 1988\n}\n\n","author_short":["Huang, Y. J.","Cohen, F."],"key":"journals/compsec/HuangC88","id":"journals/compsec/HuangC88","bibbaseid":"huang-cohen-someweakpointsofonefastcryptographicchecksumalgorithmanditsimprovement-1988","role":"author","urls":{"Link":"http://dx.doi.org/10.1016/0167-4048(88)90204-0","Paper":"http://dblp.uni-trier.de/db/journals/compsec/compsec7.html#HuangC88"},"keyword":["dblp"],"downloads":0},"search_terms":["weak","points","one","fast","cryptographic","checksum","algorithm","improvement","huang","cohen"],"keywords":["dblp"],"authorIDs":[],"dataSources":["DY7iBA8E4Z4ZyQgtk"]}