41![Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea](https://www.pdfsearch.io/img/72ab1e460f4727677be66ef20ca5ced2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-04 19:34:48
|
---|
42![Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1 Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1](https://www.pdfsearch.io/img/859a07d2eb81342650656a92e680e9af.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-11 13:21:29
|
---|
43![Collision Attack on the Waterfall Hash Function Scott Fluhrer1 1 Cisco Systems Collision Attack on the Waterfall Hash Function Scott Fluhrer1 1 Cisco Systems](https://www.pdfsearch.io/img/abda7c9abed8e2135a5d1c0e1ce03def.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-12-18 22:09:35
|
---|
44![Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands. Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.](https://www.pdfsearch.io/img/4ce2d5f9c24f20a55af02304367135b5.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-03-17 14:14:33
|
---|
45![Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1 Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1](https://www.pdfsearch.io/img/ae2e00df31191a04a0d893406f890cf2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-11-05 01:53:21
|
---|
46![A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI](https://www.pdfsearch.io/img/bb106e31cd80eac27e98560a105cd207.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-21 12:10:24
|
---|
47![Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1 Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1](https://www.pdfsearch.io/img/093ea09183a107a6605a110e922e2d16.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-03-01 09:05:12
|
---|
48![Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose](https://www.pdfsearch.io/img/4d08c4450b60e81a6cc79ce022f8d11d.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 2009-09-20 23:24:55
|
---|
49![CIS 331 Introduction to Networks & Security January 23, 2014 Project 1: Attacking Cryptographic Hashes CIS 331 Introduction to Networks & Security January 23, 2014 Project 1: Attacking Cryptographic Hashes](https://www.pdfsearch.io/img/91001b4149228f9086e6c2827cb25c82.jpg) | Add to Reading ListSource URL: www.cis.upenn.eduLanguage: English - Date: 2014-11-18 15:19:13
|
---|
50![Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT](https://www.pdfsearch.io/img/d09af0231ac6a22a0da96d3af6d51539.jpg) | Add to Reading ListSource URL: tinytocs.orgLanguage: English - Date: 2015-03-07 12:34:01
|
---|