DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Preimage attack
Preimage attack
Second Preimage Attacks on Dithered Hash Functions
A Full Key Recovery Attack on HMAC-AURORA-512
Security of VSH in the Real World
A (Second) Preimage Attack on the GOST Hash Function
The Hitchhiker's Guide to the SHA-3 Competition
NISTIR 7620 Status Report on the First Round of the SHA-3
MD4 Is Not One-Way
New Second-Preimage Attacks on Hash Functions
A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions
Constructing Secure Hash Functions by Enhancing Merkle-Damgård
CNIT 141 Cryptography for Computer Networks
Some Attacks on Merkle-Damgård Hashes
New Preimage Attack on MDC-4
Hash Function Design Overview of the Basic Components in SHA-3 Competition
Design and Analysis of Hash Functions What Is a Hash Function?
MTAT.07.017 Applied Cryptography
Means and Methods to Compromise Common Hash Algorithms
Improved Generic Attacks Against Hash-Based Macs and HAIFA⋆
Top View
Hashes, Macs & Passwords Today's Lecture Signatures Hashes Uses Of
A Second Pre-Image Attack and a Collision Attack to Cryptographic Hash Function Lux
Hash Function Security : Cryptanalysis of the Very Smooth Hash
Open Sesame the Password Hashing Competition and Argon2 Jos Wetzels
Cryptography, Homework Sheet 4 Due for 2MMC10: 05 October 2017, 10:45 and for Mastermath: 09 November 2017, 10:45 by Email to
[email protected]
Cryptographic Hash Functions and Macs Solved Exercises For
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5∗
The Hitchhiker's Guide to the SHA-3 Competition
Improved Preimage Attack on One-Block MD4
Analysis and Design of Blockcipher Based Cryptographic Algorithms
Cryptanalysis of Dedicated Cryptographic Hash Functions
Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgård
Second Preimage Attacks on Dithered Hash Functions
Contributions to Cryptanalysis: Design and Analysis of Cryptographic Hash Functions
The Design Principle of Hash Function with Merkle-Damgård Construction
Rounds, Less Security?
Cryptographic Hash Functions
Hash Functions - Bart Preneel June 2016
MD4 Is Not One-Way
Password KDF and Disk Encryption
New Way to Construct Cryptographic Hash Function I. Introduction
Cube Attacks on Cryptographic Hash Functions Joel Lathrop
An Improved Preimage Attack on MD2
NIST Special Publication 800-107 Revision 1, Recommendation For
Tradeoff Tables for Compression Functions: How to Invert Hash Values
Improved Meet-In-The-Middle Preimage Attacks Against AES Hashing Modes
Cryptographic Hash Functions
Nasha Cryptographic Hash Function
Symmetric Cryptography
Meet-In-The-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
Security Based Approach of SHA 384 and SHA 512 Algorithms in Cloud Environment
Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
Design and Analysis of Password-Based Authentication Systems
Hash Functions — Much Ado About Something
Cryptanalysis of HMAC/NMAC-Whirlpool
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
Finding Preimages in Full MD5 Faster Than Exhaustive Search
New Preimage Attacks Against Reduced SHA-1⋆
MTAT.07.017 Applied Cryptography
Generic Attacks on Hash Combiners
2.B Algorithm Specifications and Supporting Documentations 2.B.5
Evaluation of Some Blockcipher Modes of Operation
Argon2: the Better Password Hashing Function Than Bcrypt
Brute Force, Dictionary and Rainbow Table Attack on Hashed Passwords
Classification of the SHA-3 Candidates
The First SHA-3 Candidate Conference Program
Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Second Preimages on N-Bit Hash Functions for Much Less Than 2N Work
Serious Cryptography: a Practical Introduction to Modern Encryption
Secure Password Storage