Collision resistance

Results: 114



#Item
11Error detection and correction / Public-key cryptography / Hash function / XTR / RSA / Prime number / MD5 / Collision resistance / Cryptography / Finite fields / Mathematics

On the Possibility of Constructing Meaningful Hash Collisions for Public Keys Arjen Lenstra1,2 and Benne de Weger2 1 Lucent Technologies, Bell Laboratories, Room 2T-504

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2005-07-13 08:18:19
12Road transport / Traffic law / E-learning / Safety / Traffic collision / Traffic / Road traffic safety / Pedestrian crossing / Gang Resistance Education and Training / Transport / Land transport / Road safety

Request for consultant Web Developer Consultant(s) based in Ho Chi Minh City, Vietnam E-learning curriculum for the Walk Wise Project Duty Station: Ho Chi Minh City, Vietnam (preferred) Status: Consultant

Add to Reading List

Source URL: asiainjury.org

Language: English - Date: 2014-11-19 05:43:30
13Merkle–Damgård construction / SHA-1 / Collision resistance / MD5 / Collision attack / MDC-2 / Preimage attack / Hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Cryptography / One-way compression function

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
14Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
15Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
16Preimage attack / ICE / SHA-2 / SHA-1 / Hash function / VEST / Block cipher / Grøstl / Collision resistance / Cryptography / Error detection and correction / Cryptographic hash functions

SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 12:38:00
17

Improved Collision and Preimage Resistance Bounds on PGV Schemes Lei Duo1 and Chao Li2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-05 23:33:42
    18Search algorithms / Error detection and correction / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Hashing

    Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-12-25 02:38:23
    19Hashing / Search algorithms / SHA-2 / Collision resistance / Collision attack / Fast Fourier transform / Hash function / MD4 / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

    Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-12-04 19:34:48
    20Search algorithms / Computational complexity theory / Random oracle / Interactive proof system / Hash function / Zero-knowledge proof / Universal hashing / Collision resistance / Hash list / Cryptography / Cryptographic hash functions / Hashing

    — A merged version of this work and the work of [DJKL12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — Why “Fiat-Shamir for Proofs” Lacks a Proof Nir Bitansky∗ Tel Aviv Univer

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-12-19 16:42:35
    UPDATE