Back to Results
First PageMeta Content
SHA-1 / SHA-2 / Differential cryptanalysis / SHACAL / Block cipher / MD5 / Collision attack / Collision resistance / HAVAL / Cryptography / Cryptographic hash functions / Hashing


Cryptographic Hash Workshop[removed]Some applications of the Biham-Chen attack to SHA-like hash functions
Add to Reading List

Document Date: 2012-06-20 11:28:42


Open Document

File Size: 832,35 KB

Share Result on Facebook

Company

Hitachi Ltd. / Knudsen / Hirotaka Yoshida Systems Development Laboratory / /

Country

Belgium / /

IndustryTerm

collision search / /

Organization

Katholieke Universiteit Leuven / /

Person

Alex Biryukov / Bart Preneel Katholieke Universiteit Leuven / /

Technology

encryption / block cipher / /

SocialTag