Sciweavers

3 search results - page 1 / 1
» Breaking a New Hash Function Design Strategy Called SMASH
Sort
View
SACRYPT
2005
Springer
125views Cryptology» more  SACRYPT 2005»
14 years 4 months ago
Breaking a New Hash Function Design Strategy Called SMASH
Norbert Pramstaller, Christian Rechberger, Vincent...
FSE
2005
Springer
113views Cryptology» more  FSE 2005»
14 years 4 months ago
SMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and...
Lars R. Knudsen
EUROCRYPT
2005
Springer
14 years 4 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu