Merkle–Damgård construction

Results: 76



#Item
1EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2014-12-24 15:06:41
2An algorithm for MD5 single-block collision attack using high-performance computing cluster

An algorithm for MD5 single-block collision attack using high-performance computing cluster

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-07 01:57:01
3Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands  January 29, 2012

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-29 17:14:50
4CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
5MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-26 13:48:46
6More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
7Permutation-based symmetric cryptography and Keccak  Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
8A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52
9Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei, Guozhu Feng , Li Chao , and RuiLin Li Department of Science, National University of Defense Technology,Changsha, China

Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei, Guozhu Feng , Li Chao , and RuiLin Li Department of Science, National University of Defense Technology,Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-11 22:39:37
10Active Domain Expansion for Narrow-pipe Hash Xigen Yao Wuxi Hengqi Electromechanical Device Co.Ltd.China email :  November 30, 2012

Active Domain Expansion for Narrow-pipe Hash Xigen Yao Wuxi Hengqi Electromechanical Device Co.Ltd.China email : November 30, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-11-29 17:20:16