Collision attack

Results: 186



#Item
131Counter-cryptanalysis Marc Stevens CWI, Amsterdam, The Netherlands

Counter-cryptanalysis Marc Stevens CWI, Amsterdam, The Netherlands

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2013-06-08 07:57:19
132Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2010-08-24 17:09:24
133Merkle-Damg˚ ard

Merkle-Damg˚ ard

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: English - Date: 2011-05-16 11:44:04
134A Framework for Iterative Hash Functions — HAIFA Eli Biham1

A Framework for Iterative Hash Functions — HAIFA Eli Biham1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-08 13:12:03
135Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
136Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-04-11 11:06:58
137SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-05-26 16:47:31
138The Hitchhiker's Guide   to the SHA-3 Competition

The Hitchhiker's Guide to the SHA-3 Competition

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2012-07-04 01:21:00
139The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest

The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-10-27 11:58:57
140Finding Collisions in the Full SHA-1 Xiaoyun Wang1, , Yiqun Lisa Yin2 , and Hongbo Yu3 1

Finding Collisions in the Full SHA-1 Xiaoyun Wang1, , Yiqun Lisa Yin2 , and Hongbo Yu3 1

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:28