<--- Back to Details
First PageDocument Content
Hashing / SHA-2 / HMAC / Hash function / Aurora / Merkle–Damgård construction / Collision attack / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography
Date: 2008-12-11 06:33:54
Hashing
SHA-2
HMAC
Hash function
Aurora
Merkle–Damgård construction
Collision attack
Preimage attack
Collision resistance
Cryptographic hash functions
Error detection and correction
Cryptography

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Download Document from Source Website

File Size: 1,08 MB

Share Document on Facebook

Similar Documents

Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Hash function / Crypt / Merkle–Damgård construction / Error detection and correction / Cryptographic hash functions / Cryptography

EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

DocID: 1aOtM - View Document

MD5 / Search algorithms / Collision attack / MD4 / Hash function / Merkle–Damgård construction / Preimage attack / Crypt / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

An algorithm for MD5 single-block collision attack using high-performance computing cluster

DocID: 18VkZ - View Document

MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

DocID: 18gy1 - View Document

Hashing / MD5 / HMAC / Collision attack / SHA-2 / Padding / SHA-1 / Merkle–Damgård construction / Crypt / Error detection and correction / Cryptography / Cryptographic hash functions

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

DocID: 15DSq - View Document

Search algorithms / Hashing / Preimage attack / Merkle–Damgård construction / Hash function / Alexander Sotirov / Cryptographic hash functions / Cryptography / MD5

MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

DocID: 15BXR - View Document