Collision attack

Results: 186



#Item
111Public-key cryptography / Preimage attack / Hash function / Digital Signature Algorithm / Collision / Digital signature / Crypt / Collision attack / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

NIST SP[removed], Randomized Hashing for Digital Signatures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:45:25
112Hashing / Message authentication codes / SHA-2 / HMAC / SHA-1 / Collision resistance / Collision / Preimage attack / NIST hash function competition / Cryptography / Error detection and correction / Cryptographic hash functions

NIST SP[removed]Draft, Recommendation for Applications Using Approved Hash Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:03:49
113SHA-2 / Hashing / Preimage attack / Collision resistance / NIST hash function competition / Crypt / Hash function / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 10:20:26
114Medical emergencies / Injuries / Neurotrauma / Dog attack / Self-harm / Injury prevention / Traumatic brain injury / Violence / Traffic collision / Health / Medicine / Emergency medicine

Morbidity and Mortality Weekly Report Surveillance Summaries September 3, [removed]Vol[removed]No. SS-7 Surveillance for Fatal and Nonfatal

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2004-09-02 11:25:21
115MD4 / MD5 / Collision attack / RIPEMD / Venti / Hash function / Wang Xiaoyun / SHA-2 / Cryptographic hash functions / Cryptography / SHA-1

Finding Collisions in the Full SHA-1 Xiaoyun Wang1? , Yiqun Lisa Yin2 , and Hongbo Yu3 1 2

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:46:28
116SHA-2 / RIPEMD / MD5 / Preimage attack / SHA-1 / MD4 / Collision attack / Collision resistance / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft PowerPoint - preneel_hash_albenav2_print.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-06-30 04:42:21
117Hash function / Collision resistance / MD5 / SHA-1 / Differential cryptanalysis / MD4 / Block cipher / SHA-2 / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

´ n, a belt-and-mill hash function RadioGatu Guido Bertoni, Joan Daemen, Gilles Van Assche STMicroelectronics Micha¨el Peeters

Add to Reading List

Source URL: radiogatun.noekeon.org

Language: English - Date: 2013-02-27 15:27:44
118One-way compression function / MD5 / Preimage attack / SHA-2 / SHA-1 / Merkle–Damgård construction / Collision attack / N-Hash / Birthday attack / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft PowerPoint - preneel_hash_tools_2012v2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2012-05-31 19:52:41
119Electronic commerce / Key management / Hashing / Key size / SHA-1 / SHA-2 / RSA / Collision attack / NIST hash function competition / Cryptography / Cryptographic hash functions / Public-key cryptography

Microsoft PowerPoint - preneel_closing_isse12v4.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2013-10-24 09:07:43
120GOST standards / GOST / Hashing / SHA-1 / MD5 / Keccak / Hash function / Advanced Encryption Standard / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

rebound_gost_r.tex Click here to view linked References Cryptanalysis of GOST R Hash Function Zongyue Wanga , Hongbo Yub,∗, Xiaoyun Wangb a Key

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-10 21:29:48
UPDATE