<--- Back to Details
First PageDocument Content
Wang Xiaoyun / Computer programming / MD5 / Computing / Chaining / Frances Yao / Logic programming / Mathematics / SHA-2 / Cryptographic hash functions / SHA-1 / Behaviorism
Date: 2012-06-20 11:23:36
Wang Xiaoyun
Computer programming
MD5
Computing
Chaining
Frances Yao
Logic programming
Mathematics
SHA-2
Cryptographic hash functions
SHA-1
Behaviorism

Microsoft PowerPoint - SHA1-new-Result-NIST

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 276,74 KB

Share Document on Facebook

Similar Documents

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong and Xiaoyun Wang Shandong University, Tsinghua University

DocID: 1veDT - View Document

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

DocID: 1uyAd - View Document

Got control ? AutoControl: Automated Control of MultipleVirtualized Resources Pradeep Padala, Karen Hou, Xiaoyun Zhu*, Mustfa Uysal†, Zhikui Wang†, Sharad Singhal†, Arif Merchant†, Kang G. Shin

DocID: 1u8bn - View Document

Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang and Ling Qin Shandong University, Tsinghua University FSE 2017

DocID: 1tXOp - View Document

Applied mathematics / Block cipher / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Data Encryption Standard / Cube attack / Cryptography / Higher-order differential cryptanalysis

Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

DocID: 1p0gQ - View Document