Wang Xiaoyun

Results: 21



#Item
11CBC-MAC / Block cipher modes of operation / Block cipher / Cryptographic hash function / One-key MAC / PMAC / Message authentication codes / Cryptography / CMAC

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1 ⋆⋆1,2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-12 22:27:24
12Wang Xiaoyun / Computer programming / MD5 / Computing / Chaining / Frances Yao / Logic programming / Mathematics / SHA-2 / Cryptographic hash functions / SHA-1 / Behaviorism

Microsoft PowerPoint - SHA1-new-Result-NIST

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:23:36
13Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing

SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:57
14MD4 / MD5 / Collision attack / RIPEMD / Venti / Hash function / Wang Xiaoyun / SHA-2 / Cryptographic hash functions / Cryptography / SHA-1

Finding Collisions in the Full SHA-1 Xiaoyun Wang1? , Yiqun Lisa Yin2 , and Hongbo Yu3 1 2

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:46:28
15SHA-1 / MD5 / Search algorithms / Collision attack / Wang Xiaoyun / Hash function / Collision / Padding / Money supply / Cryptography / Cryptographic hash functions / Hashing

Collision Search Attacks on SHA1 Xiaoyun Wang∗

Add to Reading List

Source URL: www.c4i.org

Language: English - Date: 2006-12-02 03:56:23
16MD5 / MD4 / Collision attack / Venti / RIPEMD / Hash function / Wang Xiaoyun / SHA-2 / Cryptographic hash functions / Cryptography / SHA-1

Finding Collisions in the Full SHA-1 Xiaoyun Wang1, , Yiqun Lisa Yin2 , and Hongbo Yu3 1

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:28
17SHA-1 / MD4 / Collision attack / Padding / Hash function / Crypt / HAVAL / Cryptographic hash functions / Cryptography / MD5

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan[removed], China

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:28
18MD4 / MD5 / Collision attack / RIPEMD / Venti / Hash function / Wang Xiaoyun / SHA-2 / Cryptographic hash functions / Cryptography / SHA-1

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2005-06-01 07:41:33
19MD5 / MD4 / HAVAL / Wang Xiaoyun / X.509 / Hash function / Collision / MD2 / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2005-03-12 12:52:00
20MD4 / Search algorithms / MD5 / RIPEMD / HAVAL / Collision attack / Hash function / Wang Xiaoyun / Collision / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-05-20 06:26:09
UPDATE