First Page | Document Content | |
---|---|---|
Date: 2014-03-02 23:18:30Preimage attack MD5 SHA-2 Hash function SHA-1 Hash table Collision attack Padding Tiger Cryptographic hash functions Cryptography Error detection and correction | Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,Add to Reading ListSource URL: www.schneier.comDownload Document from Source WebsiteFile Size: 763,17 KBShare Document on Facebook |