Preimage attack

Results: 147



#Item
101Cryptographic hash function / Hash tree / Digital signature / Collision resistance / Hash function / Lamport signature / One-way compression function / Cryptography / Preimage attack / Merkle signature scheme

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-04-11 11:06:58
102Preimage attack / Collision attack / HMAC / SHA-2 / Hash function / SMASH / MD5 / SHA-1 / One-way function / Cryptographic hash functions / Cryptography / Error detection and correction

SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-05-26 16:47:31
103Block ciphers / Serpent / Preimage attack / Cryptography / Cryptographic hash functions / NIST hash function competition

The Hash Function Hamsi ¨ ul K¨ Ozg¨

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
104Hashing / Preimage attack / SHA-1 / MD5 / NIST hash function competition / Collision resistance / Crypt / HMAC / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

The Hitchhiker's Guide to the SHA-3 Competition

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2012-07-04 01:21:00
105Hashing / NIST hash function competition / Message authentication codes / MD6 / Collision resistance / HMAC / Preimage attack / Hash function / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-10-27 11:58:57
106Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
107Hashing / SHA-1 / SHA-2 / Collision attack / MD4 / Preimage attack / MD5 / Hash function / Collision resistance / Error detection and correction / Cryptography / Cryptographic hash functions

Further progress in hashing cryptanalysis∗ Arjen K. Lenstra Lucent Technologies, Bell Laboratories

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
108Cryptographic hash function / Hash tree / Digital signature / Collision resistance / Hash function / Lamport signature / One-way compression function / Cryptography / Preimage attack / Merkle signature scheme

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: imperia.rz.rub.de

Language: English - Date: 2009-12-11 06:33:14
109Preimage attack / MD5 / Hash function / SHA-1 / Collision attack / Padding / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Second Preimage Attacks on Dithered Hash Functions Elena Andreeva1 , Charles Bouillaguet2 , Pierre-Alain Fouque2 ,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-02-11 08:25:42
110Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
UPDATE