Security of cryptographic hash functions

Results: 47



#Item
11Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic

Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2004-12-02 07:12:00
12Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University  A

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
13An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-01 12:22:01
14Indifferentiability of Single-Block-Length and Rate-1 Compression Functions Hidenori Kuwakado Masakatu Morii

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions Hidenori Kuwakado Masakatu Morii

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-07 20:24:31
15On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang1 , Mridul Nandi2 , and Moti Yung3 1  3

On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang1 , Mridul Nandi2 , and Moti Yung3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 07:46:56
16Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-24 08:27:19
17Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-25 02:38:23
18A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-21 12:10:24
19STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology

STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 15:45:44
20Lessons from prosecutions of Child Pornography and other “prohibited” material Ajoy Ghosh, Security Executive   © Logica 2008.

Lessons from prosecutions of Child Pornography and other “prohibited” material Ajoy Ghosh, Security Executive © Logica 2008.

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2009-03-31 21:25:01