RIPEMD

Results: 39



#Item
1NEM  Technical Reference Version 1.0  May 15, 2015

NEM Technical Reference Version 1.0 May 15, 2015

Add to Reading List

Source URL: nem.io

Language: English - Date: 2015-05-25 20:17:43
2Introduction  Description of RIPEMD-128 Finding a differential path

Introduction Description of RIPEMD-128 Finding a differential path

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2015-09-17 19:41:23
    3ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

    ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2013-03-26 12:08:56
    4Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Hash Functions —

    Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Hash Functions —

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-05-28 08:15:33
    5Contents  I Table of Contents Part I Introduction

    Contents I Table of Contents Part I Introduction

    Add to Reading List

    Source URL: www.bytefusion.com

    Language: English - Date: 2007-05-31 21:17:32
    6Dynamic SHA Zijie Xu E-mail:  Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

    Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-11-20 08:25:40
    7Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1  Department of Computer Science and Technology, Tsinghua University, Bei

    Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-07 11:46:12
    8Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

    Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-19 18:19:12
    9Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang1, Dengguo Feng2, Xuejia Lai3, Hongbo Yu1

    Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang1, Dengguo Feng2, Xuejia Lai3, Hongbo Yu1

    Add to Reading List

    Source URL: techheap.packetizer.com

    Language: English - Date: 2004-08-18 20:15:31
    10CA642: C RYPTOGRAPHY AND N UMBER T HEORY  8 1

    CA642: C RYPTOGRAPHY AND N UMBER T HEORY 8 1

    Add to Reading List

    Source URL: www.computing.dcu.ie

    Language: English - Date: 2014-10-30 10:52:49