Preimage attack

Results: 147



#Item
41Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
42Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak Computer Science & Engineering Department, Haldia Institute of Technology, Haldia, India – 721657, E-mail – [removed] Abstract:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-06 05:29:27
43Hashing / Search algorithms / Random oracle / Preimage attack / Hash function / Collision resistance / SHA-1 / Oracle machine / Collision / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft Word - Scott Contini.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:08:36
44Search algorithms / Error detection and correction / Hash function / Random oracle / Oracle machine / Preimage attack / Elliptic curve only hash / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:10:52
45Preimage attack / NIST hash function competition / SHA-1 / Hash function / Crypt / SHA-2 / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Cryptography Research and Evaluation Committees

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:12
46Random oracle / HMAC / Collision resistance / Optimal asymmetric encryption padding / Hash function / Preimage attack / Collision / Ciphertext indistinguishability / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:02:04
47Preimage attack / GOST / SHA-1 / MD5 / SHA-2 / Hash function / Hash table / Function / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-29 21:47:28
48CRYPTREC / Collision resistance / Random oracle / Preimage attack / HMAC / Hash function / Crypt / Outline of cryptography / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:08:26
49Hashing / SHA-1 / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Search algorithms

X-Sieve: CMU Sieve 2.2 DKIM-Signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:mimeversion:content-type; b=hpQBvkv1eVIC20ITx1GF9QzMkMgj4

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:59:50
50Hash function / Collision attack / Birthday attack / Collision / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Preimage attack

Multicollision Attacks on Some Generalized Sequential Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:57:26
UPDATE