搜索结果: 1-10 共查到“军队指挥学 HAS-160”相关记录10条 . 查询时间(0.053 秒)
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
hash function RIPEMD-160 freedom degree utilization
2019/6/10
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1. However, for RIPEMD-160, no (semi-free-start)...
In this paper, we re-consider the connecting techniques to find colliding messages, which is achieved by connecting the middle part with the initial part. To obtain the best position of middle part, w...
In this paper, we propose a new cryptanalysis method to mount collision attack on RIPEMD-160. Firstly, we review two existent cryptanalysis methods to mount (semi-free-start) collision attack on MD-SH...
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160
RIPEMD-160 semi-free-start collision collision
2017/8/29
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 standardized by ISO/IEC. Firstly, we show how to theoretically calculate the step differential probabi...
Improved Cryptanalysis of Reduced RIPEMD-160
semi-free-start collision compression function
2014/3/7
In this article, we propose an improved cryptanalysis of the double-branch hash function standard RIPEMD-160. Using a carefully designed non-linear path search tool, we study the potential differentia...
A heuristic for finding compatible differential paths with application to HAS-160
akircanski at gmail com
2014/3/12
The question of compatibility of differential paths plays a central role in second order collision attacks on hash functions. In this context, attacks typically proceed by starting from the middle and...
On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
NIST Special Publication 800-57 Suite B Cryptography 80-bit security
2009/8/18
Meeting the requirements of NIST’s new cryptographic standards means phasing
out usage of 1024-bit RSA and 160-bit elliptic curve cryptography (ECC) by the end of the
year 2010. This write-up commen...
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
differential cryptanalysis related-key rectangle attack HAS-160
2009/7/14
In this paper we investigate the security of the encryption mode of the HAS-160 hash
function. HAS-160 is a Korean hash standard which is widely used in Korea’s industry. The structure
of HAS-160 is...
We present a collision attack on the hash function HAS-160
reduced to 53-steps. The attack has a complexity of about 235 hash computations.
The attack is based on the work of Cho et al. presented at...
Stateful Public-Key Cryptosystems:How to Encrypt with One 160-bit Exponentiation
Public-Key Cryptosystems Encrypt 160-bit Exponentiation
2008/12/10
We show how to significantly speed-up the encryption portion of some public-key cryptosystems
by the simple expedient of allowing a sender to maintain state that is re-used across
different encrypti...