<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic hash functions / Error detection and correction / Streebog / GOST / Preimage attack / SHA-3 / MD5 / SHA-2 / SHA-1 / Hash function / BLAKE
Date: 2018-06-14 07:12:34
Cryptography
Cryptographic hash functions
Error detection and correction
Streebog
GOST
Preimage attack
SHA-3
MD5
SHA-2
SHA-1
Hash function
BLAKE

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 378,56 KB

Share Document on Facebook

Similar Documents

MD5 considered harmful today Creating a rogue CA certificate December 30, 2008 Alexander Sotirov, Marc Stevens,  Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger

MD5 considered harmful today Creating a rogue CA certificate December 30, 2008 Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger

DocID: 1xUUG - View Document

1  MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

DocID: 1uGLV - View Document

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

DocID: 1uBX7 - View Document

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, ,   Abstract. MD5 is one of the most widely used cryptographic hash funct

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

DocID: 1uyAd - View Document

MD5 Chosen­Prefix Collisions on GPUs Marc Bevand   Black Hat USA 2009 ­ July 30, 2009

MD5 Chosen­Prefix Collisions on GPUs Marc Bevand Black Hat USA 2009 ­ July 30, 2009

DocID: 1uuKN - View Document