Merkle–Damgård construction

Results: 76



#Item
51Collision attack / SHA-2 / Merkle–Damgård construction / Cyberwarfare / Security / Cryptographic hash functions / Preimage attack / Espionage

Converting MITM Preimage Attack into Pseudo Collision Attack: Application to SHA-2

Add to Reading List

Source URL: fse2012.inria.fr

Language: English - Date: 2012-04-10 05:19:43
52Error detection and correction / Preimage attack / Search algorithms / Hash function / Collision attack / Birthday attack / Hash tree / Padding / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damg˚ ard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-02-02 00:00:00
53Preimage attack / Haifa / Hash function / Collision resistance / Merkle–Damgård construction / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

Merkle-Damg˚ ard

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: English - Date: 2011-05-16 11:44:04
54Hashing / Hash function / Preimage attack / Padding / SHA-2 / Collision attack / Merkle–Damgård construction / Collision resistance / One-way compression function / Cryptographic hash functions / Cryptography / Error detection and correction

A Framework for Iterative Hash Functions — HAIFA Eli Biham1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-08 13:12:03
55One-way compression function / Merkle–Damgård construction / Random oracle / Universal one-way hash function / Collision resistance / Hash function / Collision / Birthday attack / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
56Tiger / SHA-1 / MD5 / Differential cryptanalysis / Block cipher / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / MD4

Collisions and Near-Collisions for Reduced-Round Tiger John Kelsey1 , Stefan Lucks2

Add to Reading List

Source URL: th.informatik.uni-mannheim.de

Language: English - Date: 2006-03-09 11:16:09
57Preimage attack / MD5 / Hash function / SHA-1 / Collision attack / Padding / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Second Preimage Attacks on Dithered Hash Functions Elena Andreeva1 , Charles Bouillaguet2 , Pierre-Alain Fouque2 ,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-02-11 08:25:42
58Hashing / Public-key cryptography / Electronic commerce / Merkle–Damgård construction / Padding / MD5 / HMAC / Flickr / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2009-09-27 19:06:37
59Search algorithms / SWIFFT / Merkle–Damgård construction / Applied mathematics / Hash function / One-way function / Computing / Cyberwarfare / GOST / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2008-10-30 09:32:13
60Hashing / Message authentication codes / Advanced Encryption Standard / Merkle–Damgård construction / Hash function / Block cipher / Padding / HMAC / Grøstl / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:38:35
UPDATE