One-way compression function

Results: 80



#Item
31Collisions in MD5 Antoine Delignat-Lavaud Collisions in MD5 ... and how to use them for fun and profit.

Collisions in MD5 Antoine Delignat-Lavaud Collisions in MD5 ... and how to use them for fun and profit.

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2010-08-17 15:48:58
32Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1  Center for Information Security Technologies(CIST), Korea Universit

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 Center for Information Security Technologies(CIST), Korea Universit

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-03-05 01:27:34
33Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
34FSE[removed]17, Graz)  Some Plausible Constructions of Double-Block-Length Hash Functions  Shoichi Hirose

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
35Multicollision Attacks on Some Generalized Sequential Hash Functions

Multicollision Attacks on Some Generalized Sequential Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:57:26
36Cryptographic Hash Workshop[removed]Enhancing the MD-Strengthening & Designing Scalable 1-Way Hash Families

Cryptographic Hash Workshop[removed]Enhancing the MD-Strengthening & Designing Scalable 1-Way Hash Families

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:30:02
37Desiderata for Future Hash Functions?

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
38A Note on the security proof of Knudsen-Preneel construction of a hash function

A Note on the security proof of Knudsen-Preneel construction of a hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:26:04
39C:�uments and Settings�ydlo�Documents�PCTeX Files�1pad�pp-yinszydlosept21.DVI

C:uments and SettingsydloDocumentsPCTeX Files1padpp-yinszydlosept21.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:20:00
40Cryptographic Hash Workshop[removed]Edon-R Family of Cryptographic Hash Functions

Cryptographic Hash Workshop[removed]Edon-R Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:31:50