<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function
Date: 2008-09-27 14:59:29
Cryptography
Cryptographic hash functions
Hashing
Error detection and correction
Universal one-way hash function
Preimage attack
Collision resistance
Hash function
Hash list
SHA-3
One-way compression function

Introduction MD New Results I

Add to Reading List

Source URL: www.hyperelliptic.org

Download Document from Source Website

File Size: 937,20 KB

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic hash functions / Error detection and correction / Streebog / GOST / Preimage attack / SHA-3 / MD5 / SHA-2 / SHA-1 / Hash function / BLAKE

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

DocID: 1xT7a - View Document

Cryptography / Cryptographic hash functions / Preimage attack / Advantage / Permutation / Random oracle / Birthday attack

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

DocID: 1pg47 - View Document

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

DocID: 1lnOt - View Document

Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

Introduction MD New Results I

DocID: 1kOS7 - View Document

Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

DocID: 19LBC - View Document