11![Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic](https://www.pdfsearch.io/img/97274dbeda902cf3ab0b03a747a75fe2.jpg) | Add to Reading ListSource URL: cryptography.hyperlink.czLanguage: English - Date: 2004-12-02 07:12:00
|
---|
12![Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A](https://www.pdfsearch.io/img/f34bc033608d6eb3736a497a603b7005.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2007-05-21 19:29:06
|
---|
13![An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp](https://www.pdfsearch.io/img/4d01d89589bd85e16f6a1751aed47894.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-01 12:22:01
|
---|
14![Indifferentiability of Single-Block-Length and Rate-1 Compression Functions Hidenori Kuwakado Masakatu Morii Indifferentiability of Single-Block-Length and Rate-1 Compression Functions Hidenori Kuwakado Masakatu Morii](https://www.pdfsearch.io/img/624bc863886c8321fb6c0a2546f5fbb2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2007-01-07 20:24:31
|
---|
15![On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang1 , Mridul Nandi2 , and Moti Yung3 1 3 On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang1 , Mridul Nandi2 , and Moti Yung3 1 3](https://www.pdfsearch.io/img/4a6098d6d6943134d73fa980fbf4b9b6.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-10 07:46:56
|
---|
16![Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea](https://www.pdfsearch.io/img/65e4f36ac52c7953bb76fafe77a3e8fa.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-24 08:27:19
|
---|
17![Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is](https://www.pdfsearch.io/img/a1b4ed18592036962bdc8c721575ae89.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-12-25 02:38:23
|
---|
18![A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI](https://www.pdfsearch.io/img/bb106e31cd80eac27e98560a105cd207.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-21 12:10:24
|
---|
19![STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology](https://www.pdfsearch.io/img/e9d4c65604a1275eeef5bbad4acc2d6d.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-05-05 15:45:44
|
---|
20![Lessons from prosecutions of Child Pornography and other “prohibited” material Ajoy Ghosh, Security Executive © Logica 2008. Lessons from prosecutions of Child Pornography and other “prohibited” material Ajoy Ghosh, Security Executive © Logica 2008.](https://www.pdfsearch.io/img/20c10e23625543af2af06ef4e7fd1250.jpg) | Add to Reading ListSource URL: www.cyberlawcentre.orgLanguage: English - Date: 2009-03-31 21:25:01
|
---|