21![Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria](https://www.pdfsearch.io/img/31daf4394686849da61bfa4c2ca0b97c.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-20 04:23:58
|
---|
22![Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1 Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1](https://www.pdfsearch.io/img/dea39d7d7c9830caf623b662f2dd0c7f.jpg) | Add to Reading ListSource URL: deweger.xs4all.nlLanguage: English |
---|
23![](https://www.pdfsearch.io/img/d80648f90bb39c8663cf52e94701e9fa.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-04-09 11:38:04
|
---|
24![Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta* Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*](https://www.pdfsearch.io/img/6183c429aee6b8d664ae6412131e2592.jpg) | Add to Reading ListSource URL: nakamotoinstitute.orgLanguage: English - Date: 2014-03-23 11:44:47
|
---|
25![Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1 Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1](https://www.pdfsearch.io/img/33730af32df8bf7e1ee93d62292c8405.jpg) | Add to Reading ListSource URL: www.win.tue.nlLanguage: English - Date: 2005-03-01 03:48:44
|
---|
26![CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks](https://www.pdfsearch.io/img/a5b5aee73a78dc4c4eca259efa182fe6.jpg) | Add to Reading ListSource URL: www.cis.upenn.eduLanguage: English - Date: 2015-02-03 14:04:06
|
---|
27![More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University](https://www.pdfsearch.io/img/4d20db1cf8a6ac7bbc118f7f1cf4a878.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-15 23:12:24
|
---|
28![Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology, Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,](https://www.pdfsearch.io/img/91afef56a27b9ba988d61f8bded9078a.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:30
|
---|
29![Collision attack on NaSHA-512 Li Ji1 , Xu Liangyu1 , and Guan Xu2 1 2 Collision attack on NaSHA-512 Li Ji1 , Xu Liangyu1 , and Guan Xu2 1 2](https://www.pdfsearch.io/img/8161b46d45bac53b1b86cd288a4304c2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-02-23 05:49:39
|
---|
30![1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya 1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya](https://www.pdfsearch.io/img/d064cce3f25de4ce93ceab9b2aa1fe7e.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-12-06 19:52:41
|
---|