军事学 >>> 军事学 >>> 军队指挥学 >>> 密码学 >>>
搜索结果: 1-5 共查到密码学 iterated hash functions相关记录5条 . 查询时间(0.203 秒)
In this paper,we proposed a efficient and laconic mode for iterative hash functions and tried to fix the flaws of the Merkle-Damgaard construction completely and certainly tried to prevent varieties o...
In this paper we present a new method of constructing multi- collision sets for iterated hash functions. Multicollisions have been stud- ied quite actively since Joux published an attack against ite...
In this paper we present a new method of constructing multi- collision sets for iterated hash functions. Multicollisions have been stud- ied quite actively since Joux published an attack against ite...
This paper deals with the security of iterated hash functions against generic attacks, such as, e.g., Joux' multicollision attacks from Crypto 04 [6]. The core idea is to increase the size of the in...
In this article, we present a second preimage attack on a double block-length hash proposal presented at FSE 2006. If the hash function is instantiated with DESX as underlying block cipher, we are ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...