搜索结果: 1-3 共查到“军事学 ARIRANG”相关记录3条 . 查询时间(0.078 秒)
Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein
SHA-3 ARIRANG BLAKE Skein
font style='font-size:12px;'>
2009/7/22
The weakening of the widely used SHA-1 hash function
has also cast doubts on the strength of the related algorithms
of the SHA-2 family. The US NIST has therefore
initiated the SHA-3 competition in...
Practical pseudo-collisions for hash functions ARIRANG-224/384
practical pseudo-collision ARIRANG
font style='font-size:12px;'>
2009/6/12
In this paper we analyse the security of the SHA-3 candidate
ARIRANG. We show that bitwise complementation of whole registers
turns out to be very useful for constructing high-probability differenti...
Preimage Attack on ARIRANG
SHA-3 candidate Preimage Attack Hash Function
font style='font-size:12px;'>
2009/6/12
The hash function ARIRANG is one of the 1st round SHA-3
candidates. In this paper, we present preimage attacks on ARIRANG
with step-reduced compression functions. We consider two step-reduced
varia...