军事学 >>> 军事学 >>> 军队指挥学 >>> 密码学 >>>
搜索结果: 1-8 共查到密码学 hash algorithm相关记录8条 . 查询时间(0.127 秒)
Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm     SM3  Side-channel  Hash functions       font style='font-size:12px;'> 2019/4/3
SM3, the Chinese standard hash algorithm inspired from SHA2, can be attacker by similar means than SHA2 up to an adaptation to its differences. But this kind of attack is based on targeting point of i...
The modification of message that meets the sufficient conditions for collision is found in the last step of differential attack proposed by Wang et all. (2005) on MD4 hash algorithm. Here we show ho...
Indifferentiability of the Hash Algorithm BLAKE     hash function       font style='font-size:12px;'> 2012/6/14
The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In th...
Indifferentiability of the Hash Algorithm BLAKE     hash function       font style='font-size:12px;'> 2012/3/22
The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In th...
Indifferentiability of the Hash Algorithm BLAKE     hash function       font style='font-size:12px;'> 2012/3/21
The hash algorithm BLAKE, one of the SHA-3 finalists, was designed by Aumasson, Henzen, Meier, and Phan. Unlike other SHA-3 finalists, there is no known indifferentiable security proof on BLAKE. In th...
Improving the performance of Luffa Hash Algorithm     Luffa Hash Algorithm  Computational efficiency       font style='font-size:12px;'> 2010/9/1
Luffa is a new hash algorithm that has been accepted for round two of the NIST hash function competition SHA-3. Computational efficiency is the second most important evaluation criteria used to compar...
Data-Depend Hash Algorithm     Hash algorithm  data-depend function       font style='font-size:12px;'> 2009/12/29
We study some technologys that people had developed to analyse and attack hash algorithm. We find a way that use data-depend function to resist differential attack. Then we design a hash algorithm tha...
NESHA-256, NEw 256-bit Secure Hash Algorithm(Extended Abstract)     Hash function  NIST  Diffusion layer       font style='font-size:12px;'> 2009/6/11
In this paper, we introduce a new dedicated 256-bit hash function: NESHA-256. The recently contest for hash functions held by NIST, motivates us to design the new hash function which has a parallel ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...