First Page | Document Content | |
---|---|---|
Date: 2012-06-20 08:49:50Hash function Collision resistance Birthday attack Preimage attack Collision attack MDC-2 One-way compression function Cryptography Cryptographic hash functions Espionage | How to Construct Double-Block-Length Hash Functions ∗ Shoichi HiroseAdd to Reading ListSource URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 724,94 KBShare Document on Facebook |
r Secret Code Machines: The Inside Story The Eerie World of Espionage Ho,s Created Some Truly Strange Hsrdwsre!DocID: 1xTmM - View Document | |
“Surveillance art” reassures us: It is better to be a little paranoid Like the creators of the “Conversnitch” project, the artists of “surveillance art”1 invite us to drive out the finks and other espionage tDocID: 1vfwl - View Document | |
Susanne Knickmeier & Elisa Wallwaey Statistical Overview and First Findings of a Case Analysis of Industrial Espionage in GermanyDocID: 1v3WJ - View Document | |
Elisa Wallwaey Economic and Industrial Espionage in German SMEs OverviewDocID: 1uYr5 - View Document | |
An Exceptional Espionage Operation Tolkachev, A Worthy Successor aDocID: 1uWy5 - View Document |