割让 发表于 2025-3-28 18:28:16

Hongbo Yu,Xiaoyun Wangive, and novel methodological approaches, this book questions common assumptions, illustrates effective solutions and sets out research, policy, and programmatic agendas for the present and future..This is a co978-94-007-9670-6978-94-007-6722-5Series ISSN 1877-2560 Series E-ISSN 2215-1990

gustation 发表于 2025-3-28 20:01:16

New Local Collisions for the SHA-2 Hash Familyties of these local collisions are a little less than the GH local collision. On the other hand, the absence of impossible conditions may make them more suitable for (reduced round) collision search attacks on the SHA-2 family.
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2007; 10th International C Kil-Hyun Nam,Gwangsoo Rhee Conference proceedings 2007 Springer-Verl