![Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography](https://www.pdfsearch.io/img/dcb9995abf70a76f711e11570ee5388f.jpg) Date: 2012-06-06 05:29:27Merkle–Damgård construction Padding Hash function SHA-1 MD4 MD5 SHA-2 Preimage attack Keccak Cryptographic hash functions Error detection and correction Cryptography | | Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak Computer Science & Engineering Department, Haldia Institute of Technology, Haldia, India – 721657, E-mail – [removed] Abstract: Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 419,26 KBShare Document on Facebook
|