<--- Back to Details
First PageDocument Content
Fast Syndrome Based Hash / Hash function / Linear code / MD5 / Collision resistance / SHA-2 / Low-density parity-check code / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Cryptography
Date: 2007-05-11 03:26:00
Fast Syndrome Based Hash
Hash function
Linear code
MD5
Collision resistance
SHA-2
Low-density parity-check code
SHA-1
Provably secure cryptographic hash function
Cryptographic hash functions
Error detection and correction
Cryptography

Add to Reading List

Source URL: events.iaik.tugraz.at

Download Document from Source Website

Share Document on Facebook

Similar Documents

SHA-2 / Collision attack / MD5 / Preimage attack / MD4 / Cryptanalysis / Collision / Hash function / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / SHA-1

Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

DocID: 17M7r - View Document

Hashing / Search algorithms / SHA-2 / Collision resistance / Collision attack / Fast Fourier transform / Hash function / MD4 / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

DocID: 12NLC - View Document

Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

DocID: 12HMr - View Document

Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

DocID: 12CJD - View Document

Block cipher / Cryptographic hash function / Advanced Encryption Standard / Cryptography / Message authentication codes / CBC-MAC

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

DocID: QC4t - View Document