検索結果 2 件

デジタル記事
許, 容碩, 櫻井, 幸一, Kim, Shin-HwanBK21 IT Division, Daegu University2003-02Proc. of 2003 International Conference on Computers, Communications and Systems1p.75-78
インターネットで読める全国の図書館
  • 件名Cryptography Cryptographic hash function, HAVAL MD4 Security
  • 著者標目許, 容碩 櫻井, 幸一 Kim, Shin-Hwan
デジタル記事
2003-02Proc. of 2003 International Conference on Computers, Communications and Systems1p.75-78
インターネットで読める全国の図書館
  • 要約等HAVAL is a hash func......y Zheng et al. HAVAL has the first ......4 or 256 bits, and consists of 3-pass, 4-pass and 5-pass. Differences of these types are the number of step, permutations order and boolean functi......sselman et al. and Park et al. found collisions of 3-pass HAVAL. In order to find a collision, they used two......cessive passes of 3-pass. To verify the security of HAVAL, we try to find a collision in two non-successive passes and 4-pass HAVAL. We can evalua......n the security of HAVAL through results of our attack. Th......utations order and boolean functions have an influence on the security of HAVAL or not. For this evalua...
  • 件名Cryptography Cryptographic hash function, HAVAL MD4 Security
  • 著者標目Her Yong-Sork Sakurai Kouichi Kim Shin-Hwan

検索結果は以上です。