Back to Results
First PageMeta Content
SHA-1 / Collision attack / MD5 / Keccak / Hash function / Preimage attack / SHA-2 / Differential cryptanalysis / Error detection and correction / Cryptographic hash functions / Cryptography


Cryptanalysis of RadioGat´ un Thomas Fuhr1 and Thomas Peyrin2 1 DCSSI Labs
Add to Reading List

Document Date: 2008-12-19 11:45:40


Open Document

File Size: 336,75 KB

Share Result on Facebook

Company

Thomas Peyrin2 1 DCSSI Labs / /

Country

Panama / /

/

IndustryTerm

path search algorithm / path search phase / early-abort algorithm / meet-in-the-middle algorithm / collision search / exhaustive search phase / breadth-first search / cryptanalysis tool / search tree / domain extension algorithm / mains tools / modified breadth-first search algorithm / important tool / exhaustive search / depth-first search / final collision search complexity / search phase / /

Position

candidate for DPf / /

Product

M14 / Pentax K-x Digital Camera / M-16 / M-9 / /

Technology

cryptography / domain extension algorithm / meet-in-the-middle algorithm / 4.2 Differential path search algorithm The path search algorithm / early-abort algorithm / search algorithm / /

SocialTag