Collision resistance

Results: 114



#Item
11On the Possibility of Constructing Meaningful Hash Collisions for Public Keys Arjen Lenstra1,2 and Benne de Weger2 1  Lucent Technologies, Bell Laboratories, Room 2T-504

On the Possibility of Constructing Meaningful Hash Collisions for Public Keys Arjen Lenstra1,2 and Benne de Weger2 1 Lucent Technologies, Bell Laboratories, Room 2T-504

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2005-07-13 08:18:19
12Request for consultant Web Developer Consultant(s) based in Ho Chi Minh City, Vietnam E-learning curriculum for the Walk Wise Project Duty Station: Ho Chi Minh City, Vietnam (preferred) Status: Consultant

Request for consultant Web Developer Consultant(s) based in Ho Chi Minh City, Vietnam E-learning curriculum for the Walk Wise Project Duty Station: Ho Chi Minh City, Vietnam (preferred) Status: Consultant

Add to Reading List

Source URL: asiainjury.org

Language: English - Date: 2014-11-19 05:43:30
13More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
14Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
15Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University  A

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
16SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1

SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 12:38:00
17Improved Collision and Preimage Resistance Bounds on PGV Schemes Lei Duo1 and Chao Li2 1  2

Improved Collision and Preimage Resistance Bounds on PGV Schemes Lei Duo1 and Chao Li2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-05 23:33:42
    18Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

    Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-12-25 02:38:23
    19Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

    Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-12-04 19:34:48
    20— A merged version of this work and the work of [DJKL12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — Why “Fiat-Shamir for Proofs” Lacks a Proof Nir Bitansky∗ Tel Aviv Univer

    — A merged version of this work and the work of [DJKL12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — Why “Fiat-Shamir for Proofs” Lacks a Proof Nir Bitansky∗ Tel Aviv Univer

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-12-19 16:42:35