<--- Back to Details
First PageDocument Content
SHA-1 / Preimage attack / SHA-2 / MD5 / ICE / S-box / Hash function / Differential cryptanalysis / VEST / Cryptography / Error detection and correction / Cryptographic hash functions
Date: 2014-03-19 02:03:06
SHA-1
Preimage attack
SHA-2
MD5
ICE
S-box
Hash function
Differential cryptanalysis
VEST
Cryptography
Error detection and correction
Cryptographic hash functions

Finding Collisions for Reduced Luffa-256 v2 Bart Preneel2 , Hirotaka Yoshida12 , and Dai Watanabe1 1

Add to Reading List

Source URL: www.hitachi.com

Download Document from Source Website

File Size: 164,50 KB

Share Document on Facebook

Similar Documents

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

DocID: 1xT7a - View Document

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

DocID: 1pg47 - View Document

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1  State Key Laboratory of Information Securit

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

DocID: 1lnOt - View Document

Introduction  MD New Results I

Introduction MD New Results I

DocID: 1kOS7 - View Document

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1  IBM Research – Zurich, Switzerland

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

DocID: 19LBC - View Document