Collision attack

Results: 186



#Item
141Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
142Hashing / SHA-1 / SHA-2 / Collision attack / MD4 / Preimage attack / MD5 / Hash function / Collision resistance / Error detection and correction / Cryptography / Cryptographic hash functions

Further progress in hashing cryptanalysis∗ Arjen K. Lenstra Lucent Technologies, Bell Laboratories

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
143Cryptographic hash function / Hash tree / Digital signature / Collision resistance / Hash function / Lamport signature / One-way compression function / Cryptography / Preimage attack / Merkle signature scheme

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: imperia.rz.rub.de

Language: English - Date: 2009-12-11 06:33:14
144Hashing / Message authentication codes / Coding theory / HMAC / SHA-2 / MD5 / Key derivation function / Collision attack / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
145Preimage attack / MD5 / Hash function / SHA-1 / Collision attack / Padding / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Second Preimage Attacks on Dithered Hash Functions Elena Andreeva1 , Charles Bouillaguet2 , Pierre-Alain Fouque2 ,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-02-11 08:25:42
146Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
147NIST hash function competition / Hashing / MD6 / MD5 / MD4 / SHA-2 / SHA-1 / Collision resistance / Preimage attack / Error detection and correction / Cryptography / Cryptographic hash functions

Security Proofs for the MD6 Hash Function Mode of Operation by

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-11-05 16:27:34
148MD5 / Hashing / Collision attack / SHA-1 / MD4 / Hash function / Collision resistance / Padding / Birthday attack / Cryptography / Error detection and correction / Cryptographic hash functions

Eindhoven University of Technology Department of Mathematics and Computing Science

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-07-05 06:20:54
149SHA-1 / MD4 / Collision attack / Padding / Hash function / Crypt / HAVAL / Cryptographic hash functions / Cryptography / MD5

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan[removed], China

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:28
150Hashing / One-way compression function / Hash function / Collision resistance / MDC-2 / Birthday attack / Preimage attack / Block cipher / Collision attack / Cryptographic hash functions / Cryptography / Search algorithms

Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-06-01 18:17:49
UPDATE