Back to Results
First PageMeta Content
Cryptographic hash functions / MD5 / SHA-1 / Collision attack / Differential equation / HMAC / Differential cryptanalysis / ICE / Cryptography / Error detection and correction / Hashing


Document Date: 2010-12-25 01:29:37


Open Document

File Size: 314,38 KB

Share Result on Facebook

Company

Gmax / /

/

IndustryTerm

hash algorithms / random search / collision search / collision searching algorithm / security protocol / brute-force search / specific algorithm / search procedure / /

Organization

Center for Soft-Computing and Cryptology / Dengguo Feng State Key Lab of Information Security / Chinese Academy of Sciences / /

Person

Marc Stevens / Tao Xie / /

ProgrammingLanguage

Postscript / /

Technology

Divide-and-Conquer Strategy For Collision Searching Dedicated hash algorithms / specific algorithm / security protocol / MD5 algorithm / improved algorithm / collision searching algorithm / /

SocialTag