Preimage attack

Results: 147



#Item
51NIST recently held a workshop (Oct

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:08:30
52Desiderata for Future Hash Functions?

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
53Cryptographic Hash Workshop[removed]Edon-R Family of Cryptographic Hash Functions

Cryptographic Hash Workshop[removed]Edon-R Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:31:50
54NIST recently held a workshop (Oct

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:02:00
55Cryptographic Hash Workshop[removed]A Framework for Iterative Hash Functions - HAIFA

Cryptographic Hash Workshop[removed]A Framework for Iterative Hash Functions - HAIFA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:22:00
56How to Construct Double-Block-Length Hash Functions  ∗ Shoichi Hirose

How to Construct Double-Block-Length Hash Functions ∗ Shoichi Hirose

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:49:50
57SHA-3 Finalist Grostl: Round 3 Public Comments

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:20:30
58Find Me a Hash Susan Landau W  e’re accustomed to hearing about

Find Me a Hash Susan Landau W e’re accustomed to hearing about

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2006-02-08 14:25:14
59Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
60outbind://31-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

outbind://31-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:15:46