Back to Results
First PageMeta Content
Hashing / SHA-1 / MD5 / Collision attack / Hash function / HMAC / Collision / MD2 / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions


Malicious Hashing: Eve’s Variant of SHA-1 Ange Albertini1 , Jean-Philippe Aumasson2 , Maria Eichlseder3 , Florian Mendel3 , and Martin Schl¨affer3 1 Corkami, Germany
Add to Reading List

Document Date: 2014-09-03 12:54:02


Open Document

File Size: 432,97 KB

Share Result on Facebook

Company

EMC / Google / NSA / /

Currency

USD / /

/

Event

Business Partnership / /

Facility

Graz University of Technology / RSA’s BSAFE library / Building Meaningful Collisions To / /

IndustryTerm

cryptographic software / malicious applications / large computing power / potential applications / probabilistic algorithm / exploit algorithms / exploit algorithm / Typical applications / malicious algorithm / software implementations / cryptographic algorithms / automatic search tool / cryptography software / hash algorithms / deterministic algorithm / deterministic exploit algorithm / possible applications / non-linear equation solving tools / open-source software / /

OperatingSystem

Unix / Mac OS X / DOS / Microsoft Windows / /

Organization

Graz University of Technology / /

Person

Preneel / Ai / Rijmen / Martin Schl / /

Position

designer / malicious designer / /

Product

SHA-1 / /

ProgrammingLanguage

EC / PostScript / /

Technology

encryption / cryptography / exploit algorithms / public key / Unix / deterministic exploit algorithm / deterministic algorithm / block cipher / hash algorithms / exploit algorithm / ExpSC algorithms / malicious algorithm / also cryptographic algorithms / probabilistic algorithm / /

SocialTag