Preimage attack

Results: 147



#Item
11Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1  National Institute of Standards and Technology,

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
12Dynamic SHA Zijie Xu E-mail:  Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
13Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
14Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
15Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University  A

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
16SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1

SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 12:38:00
17Search algorithms / Error detection and correction / Preimage attack / Ciphertext indistinguishability / Advantage / Random oracle / Hash function / Cryptography / Cryptographic hash functions / Hashing

Properties of Cryptographic Hash Functions Michal Rjaˇsko Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava. E-mail: Abstract. Thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 05:01:45
18On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang1 , Mridul Nandi2 , and Moti Yung3 1  3

On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang1 , Mridul Nandi2 , and Moti Yung3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 07:46:56
19Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei, Guozhu Feng , Li Chao , and RuiLin Li Department of Science, National University of Defense Technology,Changsha, China

Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei, Guozhu Feng , Li Chao , and RuiLin Li Department of Science, National University of Defense Technology,Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-11 22:39:37
20Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1  Department of Computer Science and Technology, Tsinghua University, Bei

Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-07 11:46:12