Collision attack

Results: 186



#Item
21Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 04:23:58
22Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1

Add to Reading List

Source URL: deweger.xs4all.nl

Language: English
23

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
24Secure Names for Bit-Strings Stuart Haber*  W. Scott Stornetta*

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:44:47
25Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2005-03-01 03:48:44
26CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
27More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
28Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1  National Institute of Standards and Technology,

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
29Collision attack on NaSHA-512 Li Ji1 , Xu Liangyu1 , and Guan Xu2 1 2

Collision attack on NaSHA-512 Li Ji1 , Xu Liangyu1 , and Guan Xu2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-02-23 05:49:39
301  MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41