Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Trojan message attack"'
Autor:
Shi-Wei CHEN, INChen-Hui J
Publikováno v:
Tongxin xuebao, Vol 37, Pp 45-50 (2016)
The Trojan message attack was proposed by Andreeva,et al.aiming at the hash functions with MD structure.First it was applied on the hash function beyond MD structure,that was,concatenated hash.Utilizing the property of the concatenated hash,and combi
Externí odkaz:
https://doaj.org/article/4108b3d267904406b77782465fa00348
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811532771
Bitcoin is the first and seemingly the most successful cryptocurrency based in a peer-to-peer network that uses blockchain technology. Given Bitcoin’s growing real-life deployment and popularity, its security has aroused more and more attention in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d3abebc58566102d3dd70619d4a8e5ea
https://doi.org/10.1007/978-981-15-3278-8_13
https://doi.org/10.1007/978-981-15-3278-8_13
Autor:
Kortelainen, T. (Tuomas)
The design principles proposed independently by both Ralph Merkle and Ivan Damgård in 1989 are applied widely in hash functions that are used in practice. The construction reads the message in one message block at a time and applies iteratively a co
Externí odkaz:
http://urn.fi/urn:isbn:9789526206431
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proc. SAC 2009
SAC
SAC, Aug 2009, Calgary, Canada. 22p
SAC
SAC, Aug 2009, Calgary, Canada. 22p
International audience; In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgaard̊ construction. We extend the herding attack to concatenated hashes, and to certain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::dbfba52e9ea7ab3ba0e2b1dbea8bbe57
https://hal.inria.fr/inria-00417798/document
https://hal.inria.fr/inria-00417798/document
Publikováno v:
Selected Areas in Cryptography ISBN: 9783642054433
Selected Areas in Cryptography
Selected Areas in Cryptography
In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgard construction. We extend the herding attack to concatenated hashes, and to certain hash functions that process
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::16721c47905fac3c83f096153ec64ea3
https://doi.org/10.1007/978-3-642-05445-7_25
https://doi.org/10.1007/978-3-642-05445-7_25
This book constitutes the refereed proceedings of the Second CCF China Blockchain Conference, CBCC 2019, held in Chengdu, China, in October 2019. The 16 revised full papers presented were carefully reviewed and selected from 112 submissions. The pa
Autor:
Kazue Sako, Palash Sarkar
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised fu