军事学 >>> 军事学 >>> 军队指挥学 >>> 作战指挥 军事系统工程 军事通信学 军事情报学 密码学 军队指挥学其他学科
搜索结果: 1-11 共查到军队指挥学 MD4相关记录11条 . 查询时间(0.109 秒)
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5     Logical cryptanalysis  MD5  SHA-1  Satisfiability       font style='font-size:12px;'> 2016/1/23
In recent years, studies about the SATisfiability Problem (short for SAT) were more and more numerous because of its conceptual simplicity and ability to express a large set of various problems. Wit...
The modification of message that meets the sufficient conditions for collision is found in the last step of differential attack proposed by Wang et all. (2005) on MD4 hash algorithm. Here we show ho...
Improved Preimage Attack on One-block MD4     MD4  Extended MD4  meet-in-the-middle  preimage       font style='font-size:12px;'> 2010/11/22
We propose an improved preimage attack on one-block MD4 with the time complexity $2^{94.98}$ MD4 compression function operations, as compared to $2^{107}$ in \cite{AokiS-sac08}. We research the attack...
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SHA-2, with the resu...
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths     MD4  Differential Path  APOP  NMAC       font style='font-size:12px;'> 2009/6/2
In case of security analysis of hash functions, finding a good collision-inducing differential paths has been only focused on. However, it is not clear how differential paths of a hash function infl...
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD     Hash Functions  MD4  MD5  HAVAL-128  RIPEMD       font style='font-size:12px;'> 2009/3/27
MD5 is the hash function designed by Ron Rivest [9] as a strengthened version of MD4 [8]. In 1993 Bert den Boer and Antoon Bosselaers [1] found pseudo-collision for MD5 which is made of the same messa...
On the Security of Encryption Modes of MD4, MD5 and HAVAL      Security  Encryption Modes  MD4  MD5  HAVAL       font style='font-size:12px;'> 2009/3/5
Statistical Multiparty Computation Based on Random Walks on Graphs.
Improved Collision Attack on MD4     Collision Attack  MD4  Hash Function  Message Modification       font style='font-size:12px;'> 2009/2/8
In this paper, we propose an attack method to find collisions of MD4 hash function. This attack is the improved version of the attack which was invented by Xiaoyun Wang et al [1]. We were able to fi...
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1     HMAC  NMAC  HAVAL  MD4  MD5  SHA-0  SHA-1       font style='font-size:12px;'> 2008/11/25
HMAC is a widely used message authentication code and a pseudorandom function generator based on cryptographic hash functions such as MD5 and SHA-1. It has been standardized by ANSI, IETF, ISO and N...
In this paper, we present a new type of MultiCollision attack on the compression functions both of MD4 and 3-Pass HAVAL. For MD4, we utilize two feasible different collision differential paths to fi...
Automatic Search of Differential Path in MD4     MD4  collisions  differential path       font style='font-size:12px;'> 2008/8/26
In 2004, Wang et al. obtained breakthrough collision attacks on the main hash functions from the MD4 family. The attacks are differential attacks in which one closely follows the inner steps of the ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...