MD5

Results: 480



#Item
161Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
162Character encoding / Cross-platform software / Computer file formats / Lua / String / Filename / MD5 / Percent-encoding / Computing / Software / Internet standards

--[[ Lua source code for the Lua/APR binding. Author: Peter Odding <> Last Change: January 8, 2011

Add to Reading List

Source URL: peterodding.com

Language: English - Date: 2011-10-04 15:38:30
163Cross-platform software / Computer file formats / Lua / String / Filename / MD5 / Software / Computing / Character encoding

−−[[ Lua source code for the Lua/APR binding. Author: Peter Odding <> Last Change: January 8, 2011 Homepage: http://peterodding.com/code/lua/apr/ License: MIT

Add to Reading List

Source URL: peterodding.com

Language: English - Date: 2011-10-04 15:38:45
164Hashing / Error detection and correction / Hash function / Preimage attack / MD5 / Advantage / Oracle machine / Random oracle / Quadratic probing / Cryptography / Cryptographic hash functions / Search algorithms

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
165Cross-platform software / Computer file formats / Lua / String / Filename / MD5 / Software / Computing / Character encoding

−−[[ Lua source code for the Lua/APR binding. Author: Peter Odding <> Last Change: January 8, 2011 Homepage: http://peterodding.com/code/lua/apr/ License: MIT

Add to Reading List

Source URL: peterodding.com

Language: English - Date: 2011-10-04 15:38:34
166Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-06-15 18:30:25
167Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
168Character encoding / Cross-platform software / Computer file formats / Lua / String / Filename / MD5 / Percent-encoding / Computing / Software / Internet standards

--[[ Lua source code for the Lua/APR binding. Author: Peter Odding <> Last Change: January 8, 2011

Add to Reading List

Source URL: peterodding.com

Language: English - Date: 2011-10-04 15:38:19
169Search algorithms / One-way compression function / Merkle–Damgård construction / MD5 / Preimage attack / Hash function / Cryptography / Cryptographic hash functions / Hashing

Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei, Guozhu Feng , Li Chao , and RuiLin Li Department of Science, National University of Defense Technology,Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-11 22:39:37
170SHA-1 / Preimage attack / SHA-2 / Differential cryptanalysis / RIPEMD / MD4 / Collision attack / MD5 / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-07 11:46:12
UPDATE