Collision attack

Results: 186



#Item
51Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-08-25 02:24:24
52A near-collision attack on BLENDER-256

A near-collision attack on BLENDER-256

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-12-19 07:13:31
53Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-04 14:03:01
54formát Název-moje šablona pro docy

formát Název-moje šablona pro docy

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-11-18 20:27:25
55On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com  Abstract.

On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com Abstract.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-22 14:38:17
56formát Název-moje šablona pro docy

formát Název-moje šablona pro docy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-02 11:28:32
57Deploying a New Hash Algorithm Steven M. Bellovin [removed] Columbia University  Abstract

Deploying a New Hash Algorithm Steven M. Bellovin [removed] Columbia University Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:39
58Microsoft PowerPoint - Klima_SPI

Microsoft PowerPoint - Klima_SPI

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2007-05-05 06:57:26
59Cryptographic Hash Function  E DON - R Norwegian University of Science and Technology Trondheim, Norway

Cryptographic Hash Function E DON - R Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2009-02-11 09:26:04
60Collisions in MD5 Antoine Delignat-Lavaud Collisions in MD5 ... and how to use them for fun and profit.

Collisions in MD5 Antoine Delignat-Lavaud Collisions in MD5 ... and how to use them for fun and profit.

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2010-08-17 15:48:58