Reference:
Ahto Buldas and Sven Laur. Do broken hash functions affect the security of time-stamping schemes?. In Jianying Zhou, Moti Yung, and Feng Bao, editors, Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, volume 3989 of Lecture Notes in Computer Science, pages 50–65. Springer, 2006.
Suggested BibTeX entry:
@inproceedings{DBLP:confacnsBuldasL06,
author = {Ahto Buldas and Sven Laur},
booktitle = {Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings},
editor = {Jianying Zhou and Moti Yung and Feng Bao},
pages = {50--65},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
title = {Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?},
volume = {3989},
year = {2006},
}
|