Preimage attack

Results: 147



#Item
81Mathematical logic / Commitment scheme / Lottery / Function / Image / Inverse function / Cryptographic hash function / Preimage attack / Surjective function / Mathematics / Cryptography / Functions and mappings

Noname manuscript No. (will be inserted by the editor) Temporarily Hidden Bit Commitment and Lottery Applications David M. Goldschlag · Stuart G. Stubblebine · Paul F. Syverson

Add to Reading List

Source URL: www.syverson.org

Language: English - Date: 2012-03-07 08:53:12
82Hashing / MD4 / MD5 / SHA-1 / MD2 / RIPEMD / Collision attack / HMAC / Preimage attack / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
83Collision attack / Collision resistance / Institute for Applied Information Processing and Communications / Hash function / Collision / Vincent Rijmen / Public key fingerprint / Provably secure cryptographic hash function / Preimage attack / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - HashIntro_talk1

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
84Hashing / Collision attack / Preimage attack / MD5 / SHA-2 / Shadow password / HMAC / SHA-1 / Crypt / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft PowerPoint - PracticalImpact_talk4

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
85Search algorithms / Preimage attack / Error detection and correction / Universal one-way hash function / Collision resistance / HMAC / Hash function / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:12:02
86Hashing / SHA-2 / SHA-1 / Keccak / NIST hash function competition / Secure Hash Standard / Crypt / Hash function / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-09 12:06:39
87Preimage attack / Keccak / SHA-2 / Crypt / NIST hash function competition / Hash function / Lamport signature / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-05 14:22:31
88SHA-1 / Preimage attack / SHA-2 / MD5 / ICE / S-box / Hash function / Differential cryptanalysis / VEST / Cryptography / Error detection and correction / Cryptographic hash functions

Finding Collisions for Reduced Luffa-256 v2 Bart Preneel2 , Hirotaka Yoshida12 , and Dai Watanabe1 1

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2014-03-19 02:03:06
89MD4 / SHA-2 / SHA-1 / MD5 / Collision attack / MD2 / Collision resistance / One-way function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Preimage attack

MD4 is Not One-Way Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-11-30 19:44:46
90Hashing / NIST hash function competition / Preimage attack / SHA-1 / Keccak / Random oracle / Provable security / MD5 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE