Back to Results
First PageMeta Content
Hashing / MD5 / HMAC / Collision attack / SHA-2 / Padding / SHA-1 / Merkle–Damgård construction / Crypt / Error detection and correction / Cryptography / Cryptographic hash functions


CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks
Add to Reading List

Document Date: 2015-02-03 14:04:06


Open Document

File Size: 162,83 KB

Share Result on Facebook

Company

The National Bank of CIS / Microsoft / Constructing Forged Signatures The National Bank / /

Event

Extinction / /

Facility

Mozilla library NSS / /

IndustryTerm

client-side applications / search forum / bank accounts / web application / collision finding algorithms / hash algorithm / computing / fastcoll tool / http /

OperatingSystem

Mac OS X / Linux / Ubuntu / Microsoft Windows / /

Person

Marc Stevens / Daniel Bleichenbacher / /

Position

manager using brew / Homebrew package manager / interpreter / /

ProgrammingLanguage

Python / /

Technology

hash algorithm / public key / Linux / ASCII / API / RSA encryption / private key / collision finding algorithms / digital signature / /

URL

http /

SocialTag