Collision attack

Results: 186



#Item
51MD5 / MD4 / Preimage attack / Collision attack / Differential cryptanalysis / Hash function / RIPEMD / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / SHA-1

Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-08-25 02:24:24
52Cyberwarfare / Security / Applied mathematics / PGP word list / Cryptography / Padding / Cryptographic hash function

A near-collision attack on BLENDER-256

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-12-19 07:13:31
53Hashing / Search algorithms / Hash function / Preimage attack / SHA-1 / Collision attack / HMAC / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Error detection and correction

Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-04 14:03:01
54Hashing / Error detection and correction / Hash function / Collision attack / Padding / Espionage / Cyberwarfare / Information retrieval / Cryptographic hash functions / Cryptography / Search algorithms

formát Název-moje šablona pro docy

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-11-18 20:27:25
55SHA-1 / Preimage attack / MD5 / MD4 / Padding / RIPEMD / Collision attack / Birthday attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2

On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com Abstract.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-22 14:38:17
56Hashing / Search algorithms / Preimage attack / Rope / Entailment / Collision attack / Hash function / Logic / Cryptographic hash functions / Cryptography

formát Název-moje šablona pro docy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-02 11:28:32
57Public-key cryptography / Internet standards / Secure communication / Transport Layer Security / Cipher suite / SHA-2 / Collision attack / SHA-1 / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

Deploying a New Hash Algorithm Steven M. Bellovin [removed] Columbia University Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:39
58Cyberwarfare / Cryptographic hash function / Ciphertext / Collision attack / Hash function / Collision resistance / Security / One-way compression function / Cryptography / Block cipher / Espionage

Microsoft PowerPoint - Klima_SPI

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2007-05-05 06:57:26
59Hashing / SHA-2 / Hash function / HMAC / Endianness / Preimage attack / Padding / Collision attack / GOST / Error detection and correction / Cryptography / Cryptographic hash functions

Cryptographic Hash Function E DON - R Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2009-02-11 09:26:04
60Hashing / MD5 / Merkle–Damgård construction / Hash function / Preimage attack / Collision / Crypt / One-way compression function / Tiger / Cryptography / Cryptographic hash functions / Error detection and correction

Collisions in MD5 Antoine Delignat-Lavaud Collisions in MD5 ... and how to use them for fun and profit.

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2010-08-17 15:48:58
UPDATE