Back to Results
First PageMeta Content
SHA-1 / MD5 / MD4 / Collision attack / Cryptanalysis / Wang Xiaoyun / VEST / Hash function / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions


Document Date: 2012-04-23 13:41:22


Open Document

File Size: 151,11 KB

Share Result on Facebook

Company

Qualcomm Australia / /

Country

United States / /

/

Facility

National Institute of Standards and Technology / Macquarie University / /

IndustryTerm

collision search attacks / md4 message-digest algorithm / md5 message-digest algorithm / computer search / path searching tool / collision search / /

Organization

National Institute of Standards and Technology / Macquarie University / Centre for Advanced Computing / Advanced Computing / Algorithms and Cryptography Department of Computing / /

Person

Christian Rechberger / Jun Yajima / Michael Paddon / Eli Biham / Christophe Lemuet / Lisa Yin / Thomas Peyrin / Florent Chabaud / Antoine Joux / Terutoshi Iwasaki / Florian Mendel / Norbet Pramstaller / Martin Cochran / Yu Sasaki / Stephane Manuel / Hongbo Yu / Noboru Kunihiro / Vincent Rijmen / Philip Hawkes / Ai / Rafi Chen / David Wagner / Christophe De CanneĀ“ere / Yusuke Naito / Takeshi Shimoyama / Kazuo Ohta / William Jalby / Patrick Carribault / /

Position

Governor / analyst / /

Product

Latte W10 Portable Audio Device / /

PublishedMedium

Cryptology ePrint Archive / /

Technology

Encryption / Cryptography / md5 message-digest algorithm / md4 message-digest algorithm / block cipher / /

URL

http /

SocialTag