Race Integrity Primitives Evaluation (RIPE): A status report

  • B. Preneel
  • D. Chaum
  • W. Fumy
  • C. J. A. Jansen
  • P. Landrock
  • G. Roelofsen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 547)


Early in 1989, a call for integrity primitives was disseminated within the cryptographic community by the RIPE consortium. The goal of this consortium is to put forward an ensemble of techniques to meet the anticipated requirements of the future Integrated Broadband Communication Network in the European Community. The aim of this paper is to describe the status of the RIPE project.


Hash Function Functional Problem Unify European Market Advance Communication Technology High Speed Channel 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. [ISO7498]
    Information Processing-OSI Reference Model-Part 2: Security architecture, International Standard ISO 7498/2, International Organisation for Standardisation, 1988.Google Scholar
  2. [VdW89]
    J. Vandewalle, D. Chaum, W. Fumy, C.J.A. Jansen, P. Landrock and G. Roelofsen, “A European call for cryptographic algorithms: RIPE; Race Integrity Primitives Evaluation”, Proceedings Eurocrypt’89, Lecture Notes in Computer Science 434, Springer Verlag, 1990, p. 267–271.Google Scholar
  3. [RACE88]
    RACE Workplan”, Commission of the European Communities, 1988, Rue de la Loi 200, B-1049, Brussels, Belgium.Google Scholar
  4. [RIPE91-1]
    Evaluation of N-HASH”, RIPE Internal Report 1991-1, 1991.Google Scholar
  5. [RIPE91-2]
    Evaluation of a hash function based on modular squaring”, RIPE Internal Report 1991-2, 1991.Google Scholar
  6. [RIPE91-3]
    Evaluation of a hash function based on 32-bit arithmetic”, RIPE Internal Report 1991-3, 1991 (can not be published before March 1992).Google Scholar
  7. [RIPE91-4]
    Evaluation of LOKI”, RIPE Internal Report 1991-4, 1991.Google Scholar
  8. [RIPE91-5]
    Evaluation of MD4 (as submitted to RIPE)”, RIPE Internal Report 1991-5, 1991.Google Scholar
  9. [dRo91]
    Peter J.N. de Rooij, “On the Security of the Schnorr scheme using preprocessing”, these proceedings.Google Scholar
  10. [Riv90]
    R.L. Rivest, “The MD4 Message Digest Algorithm”, Abstracts Crypto’90, pp. 281–291.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1991

Authors and Affiliations

  • B. Preneel
    • 1
  • D. Chaum
    • 2
  • W. Fumy
    • 3
  • C. J. A. Jansen
    • 4
  • P. Landrock
    • 5
  • G. Roelofsen
    • 6
  1. 1.ESAT LabK.U.Leuven
  2. 2.C.W.I.Amsterdam
  3. 3.Siemens AGErlangen
  4. 4.Philips Crypto B.V.Eindhoven
  5. 5.Århus UniversityÅrhus
  6. 6.PTT ResearchThe Netherlands

Personalised recommendations