Hash functions

Results: 1148



#Item
291Search algorithms / One-way compression function / Merkle–Damgård construction / MD5 / Preimage attack / Hash function / Cryptography / Cryptographic hash functions / Hashing

Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei, Guozhu Feng , Li Chao , and RuiLin Li Department of Science, National University of Defense Technology,Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-11 22:39:37
292OSI protocols / Computing / Electronic engineering / Cryptographic hash functions / SHA-2 / Transmission Control Protocol

A Hardware Interface for Hashing Algorithms December 17, 2008 Zhimin Chen, Sergey Morozov, Patrick Schaumont Bradley Department of Electrical and Computer Engineering Virginia Tech

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 09:14:41
293Advanced Encryption Standard / Block cipher / Symmetric-key algorithm / Cryptanalysis / ICE / Blowfish / Cryptographic hash functions / Cryptography / Data Encryption Standard / Stream cipher

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and Macchetti in 2009

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 08:34:51
294SHA-1 / Preimage attack / SHA-2 / Differential cryptanalysis / RIPEMD / MD4 / Collision attack / MD5 / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-07 11:46:12
295Boomerang attack / SHA-1 / Blake / Differential cryptanalysis / SHA-2 / Boomerang / MD5 / Differential equation / Error detection and correction / Cryptography / Cryptographic hash functions

The Boomerang Attacks on BLAKE and BLAKE2 Yonglin Hao Department of Computer Science and Technology, Tsinghua Universtiy, Beijing, China Abstract. In this paper, we study the securit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 20:17:27
296Mathematics / Merkle–Damgård construction / Hash function / Preimage attack / MD5 / SHA-1 / SHA-2 / Entropy / Collision attack / Cryptography / Cryptographic hash functions / Error detection and correction

Active Domain Expansion for Narrow-pipe Hash Xigen Yao Wuxi Hengqi Electromechanical Device Co.Ltd.China email : November 30, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-11-29 17:20:16
297SHACAL / SHA-1 / Ciphertext / NIST hash function competition / Index of cryptography articles / One-way compression function / Cryptography / Cryptographic hash functions / Block ciphers

Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 07:11:39
298SHA-1 / SHA-2 / Hash function / Block cipher modes of operation / Block cipher / Authenticated encryption / Ciphertext indistinguishability / One-way compression function / Index of cryptography articles / Cryptography / Error detection and correction / Cryptographic hash functions

COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 05:30:49
299Search algorithms / Error detection and correction / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Hashing

Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-25 02:38:23
300SHA-1 / Collision attack / MD5 / Keccak / Hash function / Preimage attack / SHA-2 / Differential cryptanalysis / Error detection and correction / Cryptographic hash functions / Cryptography

Cryptanalysis of RadioGat´ un Thomas Fuhr1 and Thomas Peyrin2 1 DCSSI Labs

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-19 11:45:40
UPDATE