Back to Results
First PageMeta Content
SHA-1 / Preimage attack / MD5 / MD4 / Padding / RIPEMD / Collision attack / Birthday attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2


On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com Abstract.
Add to Reading List

Document Date: 2004-08-22 14:38:17


Open Document

File Size: 299,94 KB

Share Result on Facebook

Company

Gilbert and Handschuh / Qualcomm / /

/

IndustryTerm

hash algorithms / non-negative solution / hash algorithm / cryptographic algorithms / /

Person

Ai / /

Technology

hash algorithms / SHA algorithms / cryptographic algorithms / four algorithms / SHA512 algorithms / SHA-2 algorithms / following algorithm / latter four algorithms / hash algorithm / /

SocialTag