Preimage attack

Results: 147



#Item
21Active Domain Expansion for Narrow-pipe Hash Xigen Yao Wuxi Hengqi Electromechanical Device Co.Ltd.China email :  November 30, 2012

Active Domain Expansion for Narrow-pipe Hash Xigen Yao Wuxi Hengqi Electromechanical Device Co.Ltd.China email : November 30, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-11-29 17:20:16
22Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-25 02:38:23
23Cryptanalysis of RadioGat´ un Thomas Fuhr1 and Thomas Peyrin2 1  DCSSI Labs

Cryptanalysis of RadioGat´ un Thomas Fuhr1 and Thomas Peyrin2 1 DCSSI Labs

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-19 11:45:40
24Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 19:34:48
25Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1

Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-22 12:08:36
26Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-05 01:53:21
27Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1  ⋆⋆1,2

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs ⋆ Keting Jia1 , Xiaoyun Wang 1 ⋆⋆1,2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-12 22:27:24
28Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University  ABSTRACT

Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
29Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-08-25 02:24:24
30Paragraph[removed]of the Code of Ethics Estate agents and salespersons should be fully conversant with the EAO, its subsidiary legislation, this Code of Ethics, and other guidelines issued by the EAA from time to time and

Paragraph[removed]of the Code of Ethics Estate agents and salespersons should be fully conversant with the EAO, its subsidiary legislation, this Code of Ethics, and other guidelines issued by the EAA from time to time and

Add to Reading List

Source URL: text.eaa.org.hk

Language: English - Date: 2013-07-22 00:20:20