Back to Results
First PageMeta Content
Block cipher / Function / MD5 / Hashing / GOST / Mathematics / Cryptographic hash functions / Feistel cipher


F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China
Add to Reading List

Document Date: 2006-08-20 23:47:47


Open Document

File Size: 335,66 KB

Share Result on Facebook

Country

China / /

/

Facility

National University of Defense Technology / /

Holiday

Assumption / /

IndustryTerm

schedule algorithm / schedule def algorithm / exhaustive key search attack / /

NaturalFeature

mt ht / /

Organization

Feistel Chaining Duo Lei Department of Science / National University of Defense Technology / Changsha / /

Person

Horst Feistel / /

Position

Prime Minister / n·i PM / t PM / /

ProgrammingLanguage

FL / /

Technology

encryption / block cipher / same key schedule algorithm / key schedule algorithm / Defense Technology / same technology / key schedule def algorithm / /

SocialTag