MD4

Results: 166



#Item
31Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45
32SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
33Internet protocols / Secure communication / PKCS / Cryptographic hash function / Cipher suite / Crypto++ / MD4 / SHA-2 / Transport Layer Security / Cryptography / Cryptographic software / Cryptography standards

  CycloneCrypto is a cryptographic toolkit designed for use in embedded systems. It provides a comprehensive set of

Add to Reading List

Source URL: www.oryx-embedded.com

Language: English - Date: 2015-01-25 07:33:55
34MD5 / MD4 / HAVAL / Wang Xiaoyun / X.509 / Hash function / Collision / MD2 / Cryptography / Cryptographic hash functions / Hashing

Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz March 5, 2005

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-08 12:38:58
35

UEL_booking list_MD4.xlsx

Add to Reading List

Source URL: ru.uefa.org

Language: English - Date: 2015-04-09 21:54:55
    36SHA-1 / Preimage attack / SHA-2 / Differential cryptanalysis / RIPEMD / MD4 / Collision attack / MD5 / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

    Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-07 11:46:12
    37Search algorithms / MD4 / Cryptographic hash function / Collision attack / Crypt / Hash function / Q / Cryptography / Hashing / MD5

    Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

    Add to Reading List

    Source URL: www.win.tue.nl

    Language: English - Date: 2006-03-17 08:25:34
    38Hashing / Search algorithms / SHA-2 / Collision resistance / Collision attack / Fast Fourier transform / Hash function / MD4 / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

    Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-12-04 19:34:48
    39Advanced Encryption Standard / SHA-1 / MD4 / Collision attack / Stream cipher / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Block cipher

    Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-12-11 13:21:29
    40SHA-1 / MD4 / MD5 / Differential cryptanalysis / RIPEMD / Hamming weight / A5/1 / ICE / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

    Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-19 18:19:12
    UPDATE