Collision attack

Results: 186



#Item
91Message authentication codes / Cryptographic hash functions / HMAC / Internet protocols / HOTP / SHA-1 / MD5 / SHA-2 / Collision attack / Cryptography / Error detection and correction / Hashing

Attacks on SHA-1 Attacks on SHA-1 Initiative for Open AuTHentication

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:31:08
92Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing

SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:57
93Search algorithms / Error detection and correction / Collision attack / Merkle–Damgård construction / Preimage attack / Hash function / Digital signature / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Hashing

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
94Advanced Encryption Standard / Tiny Encryption Algorithm / Differential cryptanalysis / Grøstl / Crypt / Collision attack / Threefish / Cryptography / Cryptographic hash functions / NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:26:50
95Hashing / Preimage attack / HMAC / Hash function / Collision attack / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

Re: OFFICIAL COMMENT: LUX

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:14:50
96Advanced Encryption Standard / Collision attack / Crypt / Collision / SHA-1 / MD4 / Cryptographic hash functions / Cryptography / NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:17:38
97Espionage / Collision resistance / D3 road / Preimage attack / Hash function / Padding / Collision attack / D24 road / D22 road / Cryptography / Cryptographic hash functions / Hashing

OFFICIAL COMMENT: Khichidi-1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:56:06
98Espionage / SHA-2 / Cyberwarfare / Collision attack / NIST hash function competition / Hash function / Collision resistance / Computing / Collision / Cryptographic hash functions / Hashing / Cryptography

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:42:06
99Key management / Computer security / Digital signature / Non-repudiation / Public key certificate / Symmetric-key algorithm / Collision attack / Cryptography / Public-key cryptography / Notary

Security Record Kevin Wilson Greg Cannon Jeff Stapleton Anne Wang

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2005-12-08 15:19:37
100Attack on Pearl Harbor / Watercraft / Water / USNS Salvor / Marine salvage / Ehime Maru and USS Greeneville collision

DEPARTMENT OF THE NAVY USS SALVOR (ARS 52) FPO AP[removed]Ser C0/021

Add to Reading List

Source URL: www.history.navy.mil

Language: English - Date: 2006-08-09 01:00:00
UPDATE