Back to Results
First PageMeta Content
Preimage attack / Collision attack / SHA-1 / MD5 / SHA-2 / Collision resistance / Tiger / Hash function / Hash tree / Cryptographic hash functions / Cryptography / Error detection and correction


Document Date: 2006-02-18 13:57:44


Open Document

File Size: 304,08 KB

Share Result on Facebook

City

La Jolla / /

Company

the New York Times / /

Country

United States / /

Currency

pence / /

/

Facility

Structure Building / National Institute of Standards and Technology / University of California / University of California at Berkeley / /

IndustryTerm

real-world applications / collision-search algorithm / brute-force search / naive algorithm / collision search / collision-finding algorithms / search algorithm yields / search structure / parallel collision search algorithm / collision-finding algorithm / /

Organization

National Institute of Standards and Technology / National Science Foundation / Department of Computer Science & Engineering / University of California at San Diego / /

Person

Alice / /

Position

Governor / /

ProvinceOrState

California / /

PublishedMedium

the New York Times / /

Technology

collision-search algorithm / collision-finding algorithm / naive algorithm / collision-finding algorithms / parallel collision search algorithm / /

URL

http /

SocialTag