Back to Results
First PageMeta Content
Cryptographic hash functions / HMAC / SHA-1 / MD5 / Collision attack / Hash function / MD4 / Collision resistance / SHA-2 / Error detection and correction / Cryptography / Hashing


Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb
Add to Reading List

Document Date: 2008-09-17 07:43:00


Open Document

File Size: 245,81 KB

Share Result on Facebook

Company

AES / Let us / /

/

Facility

Graz University of Technology / /

IndustryTerm

collision search methods / collision search / secure authentication services / efficient search algorithms / search phase / /

Organization

Group of 20 countries / US National Security Agency / Institute for Applied Information Processing and Communications / Graz University of Technology / /

Person

Christian Rechberger / Vincent Rijmen / Ai / /

Position

feed forward / representative / /

Product

ipad / /

Technology

cryptography / secret key / efficient search algorithms / /

SocialTag