Back to Results
First PageMeta Content
Preimage attack / SHA-2 / SHA-1 / MD4 / MD5 / Collision resistance / Tiger / Collision attack / Image / Cryptography / Cryptographic hash functions / Hashing


Document Date: 2010-09-03 03:33:03


Open Document

File Size: 306,50 KB

Share Result on Facebook

City

Heverlee / /

Company

Leurent / /

Country

Belgium / /

/

Event

Force Majeure / /

Facility

Nanyang Technological University / Interdisciplinary Institute / /

Holiday

Assumption / /

IndustryTerm

collision search methods / pseudo-preimage algorithm / file-sharing protocols / decentralized file systems / online phase / applicable tools / file sharing protocols / brute force search complexities / search space / /

OperatingSystem

Windows NT / /

Organization

MTPP FPLP / Nanyang Technological University / Singapore / School of Physical and Mathematical Sciences / Division of Mathematical Sciences / US Federal Reserve / Electrical Engineering ESAT/COSIC / K.U.Leuven / and Interdisciplinary Institute for BroadBand Technology / /

/

Position

Prime Minister / 2n−l 2l 2l PM / /

Product

M14 / M-16 / M-9 / /

Technology

pseudo-preimage algorithm / file-sharing protocols / BroadBand Technology / file sharing protocols / /

SocialTag