<--- Back to Details
First PageDocument Content
MD4 / MD5 / RIPEMD / Hans Dobbertin / HAVAL / SHA-1 / Comparison of cryptographic hash functions / Hash function / Collision / Cryptography / Cryptographic hash functions / Hashing
Date: 2004-08-18 20:15:31
MD4
MD5
RIPEMD
Hans Dobbertin
HAVAL
SHA-1
Comparison of cryptographic hash functions
Hash function
Collision
Cryptography
Cryptographic hash functions
Hashing

Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang1, Dengguo Feng2, Xuejia Lai3, Hongbo Yu1

Add to Reading List

Source URL: techheap.packetizer.com

Download Document from Source Website

File Size: 56,14 KB

Share Document on Facebook

Similar Documents

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group   Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

DocID: 1xTVd - View Document

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

DocID: 1xT7a - View Document

The Skein Hash Function Family Version 1.3 — 1 Oct 2010 Niels Ferguson Stefan Lucks Bruce Schneier

The Skein Hash Function Family Version 1.3 — 1 Oct 2010 Niels Ferguson Stefan Lucks Bruce Schneier

DocID: 1tn3m - View Document

On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

DocID: 1t9VA - View Document

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

DocID: 1rEjw - View Document