Collision attack

Results: 186



#Item
121Hashing / MD4 / MD5 / SHA-1 / MD2 / RIPEMD / Collision attack / HMAC / Preimage attack / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
122Collision attack / Collision resistance / Institute for Applied Information Processing and Communications / Hash function / Collision / Vincent Rijmen / Public key fingerprint / Provably secure cryptographic hash function / Preimage attack / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - HashIntro_talk1

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
123Hashing / Collision attack / Preimage attack / MD5 / SHA-2 / Shadow password / HMAC / SHA-1 / Crypt / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft PowerPoint - PracticalImpact_talk4

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
124SHA-1 / MD5 / Search algorithms / Collision attack / Wang Xiaoyun / Hash function / Collision / Padding / Money supply / Cryptography / Cryptographic hash functions / Hashing

Collision Search Attacks on SHA1 Xiaoyun Wang∗

Add to Reading List

Source URL: www.c4i.org

Language: English - Date: 2006-12-02 03:56:23
125Search algorithms / Preimage attack / Error detection and correction / Universal one-way hash function / Collision resistance / HMAC / Hash function / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:12:02
126MD4 / SHA-2 / SHA-1 / MD5 / Collision attack / MD2 / Collision resistance / One-way function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Preimage attack

MD4 is Not One-Way Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-11-30 19:44:46
127Search algorithms / Error detection and correction / Preimage attack / One-way compression function / Collision resistance / Collision attack / One-way function / Hash function / Collision / Cryptography / Cryptographic hash functions / Hashing

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
128Collision attack / SHA-2 / Merkle–Damgård construction / Cyberwarfare / Security / Cryptographic hash functions / Preimage attack / Espionage

Converting MITM Preimage Attack into Pseudo Collision Attack: Application to SHA-2

Add to Reading List

Source URL: fse2012.inria.fr

Language: English - Date: 2012-04-10 05:19:43
129Search algorithms / Hashing / Preimage attack / MD5 / SHA-1 / Collision attack / Hash function / Hash table / MD4 / Cryptography / Cryptographic hash functions / Error detection and correction

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-29 10:08:07
130Error detection and correction / Preimage attack / Search algorithms / Hash function / Collision attack / Birthday attack / Hash tree / Padding / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damg˚ ard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-02-02 00:00:00
UPDATE