#hash-function

Alternate Text
Introduction Pseudo preimages Preimages Conclusion
Category

Documents

Introduction Pseudo preimages Preimages Conclusion

Gaëtan Leurent

Introduction Pseudo preimages Preimages Conclusion Alternate Text
Category

Documents

Cours

Introduction Pseudo preimages Preimages Conclusion

Gaëtan Leurent

Book

101 pages

Flag

icon play Lire
icon play Infos
Automatic Search of Differential
Category

Documents

Automatic Search of Differential

Gaëtan Leurent

Automatic Search of Differential Alternate Text
Category

Documents

Cours

Automatic Search of Differential

Gaëtan Leurent

Book

50 pages

Flag

English

icon play Lire
icon play Infos
Introduction The SHA competition New attacks on SHA candidates
Category

Documents

Introduction The SHA competition New attacks on SHA candidates

Gaëtan Leurent

Introduction The SHA competition New attacks on SHA candidates Alternate Text
Category

Documents

Cours

Introduction The SHA competition New attacks on SHA candidates

Gaëtan Leurent

Book

110 pages

Flag

English

icon play Lire
icon play Infos
Introduction Application to Lesamnta Application to SHAvite
Category

Documents

Introduction Application to Lesamnta Application to SHAvite

Charles Bouillaguet

Introduction Application to Lesamnta Application to SHAvite Alternate Text
Category

Documents

Cours

Introduction Application to Lesamnta Application to SHAvite

Charles Bouillaguet

Book

53 pages

Flag

English

icon play Lire
icon play Infos
Introduction New Attack Extensions conclusion
Category

Documents

Introduction New Attack Extensions conclusion

Second Preimage

Introduction New Attack Extensions conclusion Alternate Text
Category

Documents

Education

Introduction New Attack Extensions conclusion

Second Preimage

Book

47 pages

Flag

English

icon play Lire
icon play Infos
How Risky is the Random Oracle Model
Category

Documents

How Risky is the Random Oracle Model

Gaetan Leurent1

How Risky is the Random Oracle Model Alternate Text
Category

Documents

Etudes supérieures

How Risky is the Random Oracle Model

Gaetan Leurent1

Book

21 pages

Flag

English

icon play Lire
icon play Infos
Practical Key Recovery Attack against Secret IV Edon R
Category

Documents

Practical Key Recovery Attack against Secret IV Edon R

Gaëtan Leurent

Practical Key Recovery Attack against Secret IV Edon R Alternate Text
Category

Documents

Education

Practical Key Recovery Attack against Secret IV Edon R

Gaëtan Leurent

Book

16 pages

Flag

English

icon play Lire
icon play Infos
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
Category

Documents

Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks

Malekzadeh Mina, Abdul, Subramaniam, Subramaniam Shamala

Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks Alternate Text
Category

Documents

Savoirs

Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks

Malekzadeh Mina, Abdul, Subramaniam, Subramaniam Shamala

Book

20 pages

Flag

English

icon play Lire
icon play Infos
Cryptanalysis of a Hash Function Based on Quasi Cyclic Codes
Category

Documents

Cryptanalysis of a Hash Function Based on Quasi Cyclic Codes

Gaëtan Leurent

Cryptanalysis of a Hash Function Based on Quasi Cyclic Codes Alternate Text
Category

Documents

Cours

Cryptanalysis of a Hash Function Based on Quasi Cyclic Codes

Gaëtan Leurent

Book

57 pages

Flag

English

icon play Lire
icon play Infos
MD4 is Not One Way
Category

Documents

MD4 is Not One Way

Gaëtan Leurent

MD4 is Not One Way Alternate Text
Category

Documents

Education

MD4 is Not One Way

Gaëtan Leurent

Book

16 pages

Flag

English

icon play Lire
icon play Infos
Introduction Analysis of the MD4 family The Design of SIMD Attacks on New Hash Functions
Category

Documents

Introduction Analysis of the MD4 family The Design of SIMD Attacks on New Hash Functions

Gaëtan Leurent

Introduction Analysis of the MD4 family The Design of SIMD Attacks on New Hash Functions Alternate Text
Category

Documents

Cours

Introduction Analysis of the MD4 family The Design of SIMD Attacks on New Hash Functions

Gaëtan Leurent

Book

139 pages

Flag

English

icon play Lire
icon play Infos
Introduction Concatenated Hashes and Variations Trojan Messages Conclusion
Category

Documents

Introduction Concatenated Hashes and Variations Trojan Messages Conclusion

Second Preimage

Introduction Concatenated Hashes and Variations Trojan Messages Conclusion Alternate Text
Category

Documents

Education

Introduction Concatenated Hashes and Variations Trojan Messages Conclusion

Second Preimage

Book

58 pages

Flag

English

icon play Lire
icon play Infos
the Random Oracle Model
Category

Documents

The Random Oracle Model

Gaëtan Leurent

the Random Oracle Model Alternate Text
Category

Documents

Cours

The Random Oracle Model

Gaëtan Leurent

Book

48 pages

Flag

English

icon play Lire
icon play Infos
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents
Alternate Text