نتایج جستجو برای: nine weaknesses

تعداد نتایج: 221784  

2007
Florian Mendel Vincent Rijmen

HAS-V is a cryptographic hash function which processes 1024-bit message blocks and produces a hash value of variable length. The design of the hash function is based on design principles of the MD4 family. Recently, weaknesses have been shown in members of this family. Therefore, the analysis of the HAS-V hash function is of great interest. To the best of our knowledge this is the first article...

2000
Niels Ferguson Bruce Schneier David A. Wagner

TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We define a variation of Maurer’s cipher that appears to be similar to the TriStrata version, and show several cryptanalytical attacks against our variant.

2000
Rainer Steinwandt Markus Grassl Willi Geiselmann Thomas Beth

We show that for various choices of the parameters in the SL2(IF2n) hashing scheme, suggested by Tillich and Zémor, messages can be modified without changing the hash value. Moreover, examples of hash functions “with a trapdoor” within this family are given. Due to these weaknesses one should impose at least certain restrictions on the allowed parameter values when using the SL2(IF2n) hashing s...

Journal: :Journal of Experimental Psychology: Learning, Memory, and Cognition 2020

Journal: :Eos, Transactions American Geophysical Union 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید