Preimage attack

Results: 147



#Item
71Preimage attack / Keccak / SHA-1 / SHA-2 / Collision resistance / Random oracle / Grøstl / MD5 / Hash function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Security Analysis and Commparison of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:31:40
72Public-key cryptography / Preimage attack / Hash function / Digital Signature Algorithm / Collision / Digital signature / Crypt / Collision attack / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

NIST SP[removed], Randomized Hashing for Digital Signatures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:45:25
73Hashing / Message authentication codes / SHA-2 / HMAC / SHA-1 / Collision resistance / Collision / Preimage attack / NIST hash function competition / Cryptography / Error detection and correction / Cryptographic hash functions

NIST SP[removed]Draft, Recommendation for Applications Using Approved Hash Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:03:49
74SHA-2 / Hashing / Preimage attack / Collision resistance / NIST hash function competition / Crypt / Hash function / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 10:20:26
75SHA-2 / SHA-1 / MD4 / MD5 / Crypt / Fingerprint / Public key fingerprint / Hash function / Preimage attack / Cryptographic hash functions / Cryptography / Computing

NIST’s National Software Reference Library Douglas White, Software Diagnostics & Conformance Testing Division

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2004-11-16 07:11:22
76Mathematics / Keccak / NIST hash function competition / Joan Daemen / SHA-1 / Cryptol / Function / MD5 / Preimage attack / Cryptography / Error detection and correction / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-29 09:04:53
77SHA-2 / RIPEMD / MD5 / Preimage attack / SHA-1 / MD4 / Collision attack / Collision resistance / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft PowerPoint - preneel_hash_albenav2_print.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-06-30 04:42:21
78Hash function / Collision resistance / MD5 / SHA-1 / Differential cryptanalysis / MD4 / Block cipher / SHA-2 / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

´ n, a belt-and-mill hash function RadioGatu Guido Bertoni, Joan Daemen, Gilles Van Assche STMicroelectronics Micha¨el Peeters

Add to Reading List

Source URL: radiogatun.noekeon.org

Language: English - Date: 2013-02-27 15:27:44
79One-way compression function / MD5 / Preimage attack / SHA-2 / SHA-1 / Merkle–Damgård construction / Collision attack / N-Hash / Birthday attack / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft PowerPoint - preneel_hash_tools_2012v2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2012-05-31 19:52:41
80One-way function / Permutation / Preimage attack / Applied mathematics / Mathematics / Combinatorics / Cryptography

Hash Functions Based on Three Permutations: A Generic Security Analysis Bart Mennink and Bart Preneel Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and IBBT, Belgium [removed], bart.preneel@esa

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE