Collision attack

Results: 186



#Item
61Hashing / Message authentication codes / Search algorithms / Preimage attack / HMAC / Collision resistance / MD5 / CBC-MAC / Universal hashing / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic hashing Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-14 14:59:32
62SHA-1 / SHA-2 / Institute for Applied Information Processing and Communications / RIPEMD / Krypto / Vincent Rijmen / Collision attack / Sha / Cryptographic hash functions / Cryptography / MD4

Analysis of Step-Reduced SHA-256

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-19 06:40:58
63Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
64Cryptographic hash functions / HMAC / SHA-1 / MD5 / Collision attack / Hash function / MD4 / Collision resistance / SHA-2 / Error detection and correction / Cryptography / Hashing

Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb

Add to Reading List

Source URL: www.jucs.org

Language: English - Date: 2008-09-17 07:43:00
65Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
66Traffic collision / Road traffic safety / September 11 attacks / Automobile safety / Suicide attack / Vehicle miles traveled tax / Transport / Land transport / Road transport

Microsoft Word - fatalities_web.doc

Add to Reading List

Source URL: aem.cornell.edu

Language: English - Date: 2013-06-17 13:47:30
67Hashing / Search algorithms / Random oracle / Preimage attack / Hash function / Collision resistance / SHA-1 / Oracle machine / Collision / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft Word - Scott Contini.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:08:36
68Japan / Management / Incident Command System / Unified Command / United States Coast Guard / Honolulu International Airport / Honolulu County /  Hawaii / Attack on Pearl Harbor / Public safety / Emergency management / Ehime Maru and USS Greeneville collision

APPENDIX F INCIDENT ACTION PLAN RESPONSE OBJECTIVES and STRATEGIES *

Add to Reading List

Source URL: www.cpf.navy.mil

Language: English - Date: 2011-01-28 14:44:13
69Preimage attack / NIST hash function competition / SHA-1 / Hash function / Crypt / SHA-2 / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Cryptography Research and Evaluation Committees

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:12
70Random oracle / HMAC / Collision resistance / Optimal asymmetric encryption padding / Hash function / Preimage attack / Collision / Ciphertext indistinguishability / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:02:04
UPDATE