<--- Back to Details
First PageDocument Content
Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing
Date: 2009-01-14 05:49:51
Preimage attack
Collision attack
HMAC
Random oracle
Collision resistance
Hash function
Collision
One-way compression function
Provably secure cryptographic hash function
Cryptography
Cryptographic hash functions
Hashing

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Download Document from Source Website

File Size: 2,01 MB

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic hash functions / Error detection and correction / Streebog / GOST / Preimage attack / SHA-3 / MD5 / SHA-2 / SHA-1 / Hash function / BLAKE

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

DocID: 1xT7a - View Document

Cryptography / Cryptographic hash functions / Preimage attack / Advantage / Permutation / Random oracle / Birthday attack

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

DocID: 1pg47 - View Document

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

DocID: 1lnOt - View Document

Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

Introduction MD New Results I

DocID: 1kOS7 - View Document

Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

DocID: 19LBC - View Document