搜索结果: 1-4 共查到“军事学 Second Preimages”相关记录4条 . 查询时间(0.062 秒)
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
hash functions keccak sha-3
2012/3/28
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parameters r,c and d receive values from the formal proposal for the Keccak hash function (with the hash o...
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak
hash functions keccak sha-3
2011/6/9
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parameters r,c and d receive values from the formal proposal for the Keccak hash function (with the hash o...
Second Preimages on n-bit Hash Functions for Much Less than 2n Work
Second Preimages n-bit Hash Functions
2009/4/1
We provide a second preimage attack on all n-bit iterated
hash functions with Damgard-Merkle strengthening and n-bit interme-
diate states, allowing a second preimage to be found for a 2k-message-
...
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass
iterated hash functions double block-length hash functions differential cryptanalysis
2008/11/11
In this article, we present a second preimage attack on a
double block-length hash proposal presented at FSE 2006. If the hash
function is instantiated with DESX as underlying block cipher, we are
...