<--- Back to Details
First PageDocument Content
NIST hash function competition / Hashing / SHA-2 / MD6 / HMAC / Preimage attack / CubeHash / SHA-1 / NaSHA / Error detection and correction / Cryptographic hash functions / Cryptography
Date: 2009-07-15 19:17:03
NIST hash function competition
Hashing
SHA-2
MD6
HMAC
Preimage attack
CubeHash
SHA-1
NaSHA
Error detection and correction
Cryptographic hash functions
Cryptography

Add to Reading List

Source URL: cubehash.cr.yp.to

Download Document from Source Website

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic hash functions / Error detection and correction / Streebog / GOST / Preimage attack / SHA-3 / MD5 / SHA-2 / SHA-1 / Hash function / BLAKE

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

DocID: 1xT7a - View Document

Cryptography / Cryptographic hash functions / Preimage attack / Advantage / Permutation / Random oracle / Birthday attack

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

DocID: 1pg47 - View Document

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

DocID: 1lnOt - View Document

Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

Introduction MD New Results I

DocID: 1kOS7 - View Document

Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

DocID: 19LBC - View Document