Skip to main content

Correcting-block attack

  • Reference work entry
Book cover Encyclopedia of Cryptography and Security
  • 73 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Bosset, J. (1977). “Contre les risques d'altération, un système de certification des informations.” 01 Informatique, 107.

    Google Scholar 

  2. Camion, P. (1986). “Can a fast signature scheme without secret be secure?” Proc. 2nd International Conference on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes, Lecture Notes in Computer Science, vol. 228, ed. A. Poli. Springer-Verlag, Berlin, 215–241.

    Google Scholar 

  3. Coppersmith, D. (1989). “Analysis of ISO/CCITT document X.509 annex D.” IBM T.J. Watson Center, Yorktown Heights, NY. Internal Memo.

    Google Scholar 

  4. Davies, D. and W.L. Price (1984). “Digital signatures, an update.” Proc. 5th International Conference on Computer Communication, October 1984, 845–849.

    Google Scholar 

  5. Girault, M. (1988). “Hash-functions using modulo-n operations.” Advances in Cryptology—EUROCRYPT'87, Lecture Notes in Computer Science, vol. 304, eds. D. Chaum and W.L. Price. Springer-Verlag, Berlin, 217–226.

    Google Scholar 

  6. Girault, M. and J.-F. Misarsky (1997). “Selective forgery of RSA signatures using redundancy.” Advances in Cryptology—EUROCRYPT'97, Lecture Notes in Computer Science, vol. 1233, ed. W. Fumy. Springer-Verlag, Berlin, 495–507.

    Google Scholar 

  7. ISO/IEC 10118 (1998). “Information technology—security techniques—hash-functions.” Part 4: Hash-Functions Using Modular Arithmetic, 10118-4:1998.

    Google Scholar 

  8. ITU-T X.500 (1988). “The directory—overview of concepts.” ITU-T Recommendation X.500 (same as IS 9594-1, 1989).

    Google Scholar 

  9. Preneel, B. (1993). “Analysis and design of cryptographic hash functions.” Doctoral Dissertation, Katholieke Universiteit Leuven.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Preneel, B. (2005). Correcting-block attack. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_79

Download citation

Publish with us

Policies and ethics