Collision attack

Results: 186



#Item
41Hashing / Search algorithms / SHA-2 / Collision resistance / Collision attack / Fast Fourier transform / Hash function / MD4 / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 19:34:48
42Advanced Encryption Standard / SHA-1 / MD4 / Collision attack / Stream cipher / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Block cipher

Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-11 13:21:29
43Mechanisms / Hash function / Algorithm / Mechanical engineering / Mathematics / Differential

Collision Attack on the Waterfall Hash Function Scott Fluhrer1 1 Cisco Systems

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 22:09:35
44Search algorithms / MD4 / Cryptographic hash function / Collision attack / Crypt / Hash function / Q / Cryptography / Hashing / MD5

Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-03-17 14:14:33
45Electronic commerce / MD5 / Hashing / Collision attack / X.509 / SHA-1 / Padding / Collision / Preimage attack / Cryptography / Public-key cryptography / Cryptographic hash functions

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-05 01:53:21
46Block cipher / Hash function / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Collision attack

A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-21 12:10:24
47X.509 / RSA / Public key certificate / Padding / Digital signature / Cryptographic hash function / Arjen Lenstra / PKCS / Collision attack / Cryptography / Public-key cryptography / MD5

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-01 09:05:12
48Search algorithms / Error detection and correction / MD5 / Collision resistance / Hash function / SHA-1 / Birthday attack / Collision / Quadratic probing / Cryptographic hash functions / Cryptography / Hashing

Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:24:55
49Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Crypt / Merkle–Damgård construction / Hash function / Error detection and correction / Cryptographic hash functions / Cryptography

CIS 331 Introduction to Networks & Security January 23, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
50Collision attack / Preimage attack / Spectral Hash / Hash function / Collision / NIST hash function competition / Oracle machine / Cryptography / Cryptographic hash functions / Random oracle

Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
UPDATE