搜索结果: 1-8 共查到“军事学 Hash algorithm”相关记录8条 . 查询时间(0.125 秒)
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm
SM3 Side-channel Hash functions
2019/4/3
SM3, the Chinese standard hash algorithm inspired from SHA2, can be attacker by similar means than SHA2 up to an adaptation to its differences. But this kind of attack is based on targeting point of i...
Finding collisions for MD4 hash algorithm using hybrid algorithm
Evolutionary algorithm hill climbing hash algorithm
2016/1/9
The modification of message that meets the sufficient conditions
for collision is found in the last step of differential attack proposed by
Wang et all. (2005) on MD4 hash algorithm. Here we show ho...
The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In th...
The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In th...
The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In th...
Improving the performance of Luffa Hash Algorithm
Luffa Hash Algorithm Computational efficiency
2010/9/1
Luffa is a new hash algorithm that has been accepted for round two of the NIST hash function competition SHA-3. Computational efficiency is the second most important evaluation criteria used to compar...
We study some technologys that people had developed to analyse and attack hash algorithm. We find a way that use data-depend function to resist differential attack. Then we design a hash algorithm tha...
NESHA-256, NEw 256-bit Secure Hash Algorithm(Extended Abstract)
Hash function NIST Diffusion layer
2009/6/11
In this paper, we introduce a new dedicated 256-bit hash function:
NESHA-256. The recently contest for hash functions held by NIST, motivates
us to design the new hash function which has a parallel ...