Preimage attack

Results: 147



#Item
51Hashing / SHA-2 / SHA-1 / Collision attack / MD4 / HMAC / RadioGatún / Preimage attack / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Error detection and correction

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:08:30
52Error detection and correction / Search algorithms / Hash function / Merkle–Damgård construction / Preimage attack / Hash list / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
53One-way compression function / Collision resistance / Quasigroup / Hash function / SHA-2 / SHA-1 / Collision attack / Collision / MD5 / Cryptographic hash functions / Cryptography / Preimage attack

Cryptographic Hash Workshop[removed]Edon-R Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:31:50
54SHA-1 / SHA-2 / Merkle–Damgård construction / Collision attack / Tiger / HMAC / Hash function / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:02:00
55Hashing / Search algorithms / Hash function / Preimage attack / Collision attack / SHA-1 / SHA-2 / Padding / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]A Framework for Iterative Hash Functions - HAIFA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:22:00
56Hash function / Collision resistance / Birthday attack / Preimage attack / Collision attack / MDC-2 / One-way compression function / Cryptography / Cryptographic hash functions / Espionage

How to Construct Double-Block-Length Hash Functions ∗ Shoichi Hirose

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:49:50
57NIST hash function competition / Hashing / SHA-2 / Preimage attack / Grøstl / Keccak / Collision attack / Collision resistance / Advanced Encryption Standard / Cryptography / Error detection and correction / Cryptographic hash functions

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:20:30
58Hashing / SHA-1 / MD4 / SHA-2 / MD5 / Crypt / Collision attack / Collision resistance / Preimage attack / Cryptography / Cryptographic hash functions / Error detection and correction

Find Me a Hash Susan Landau W e’re accustomed to hearing about

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2006-02-08 14:25:14
59Search algorithms / Error detection and correction / Collision attack / Merkle–Damgård construction / Preimage attack / Hash function / Digital signature / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Hashing

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
60Preimage attack / NIST hash function competition / Hash function / Cryptography / Cryptographic hash functions / Hashing

outbind://31-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:15:46
UPDATE