Showing 1 - 16 results of 16 for search '"HAVAL"', query time: 0.13s Refine Results
  1. 1
    Published 2014
    Full Text via HEAL-Link
    Electronic eBook
  2. 2
    Published 2009
    Table of Contents: “…Hash Functions -- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 3
    Published 2008
    Table of Contents: “… Permutation -- Hash Function Cryptanalysis (I) -- Second Preimage Attack on 3-Pass HAVAL and Partial Key…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 4
    Published 2016
    Table of Contents: “… Liu, Timm Heinbokel, and Stefan G. Tullius -- New frontiers and new technologies / Haval Shirwan…”
    Full Text via HEAL-Link
    eBook
  5. 5
    Published 2007
    Table of Contents: “… for the SHA-2 Hash Family -- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 6
    Published 2006
    Table of Contents: “… Functions I -- Cryptanalysis of the Full HAVAL with 4 and 5 Passes -- Collisions and Near-Collisions…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    Published 2006
    Table of Contents: “… -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 8
    Published 2009
    Table of Contents: “… on 3-Pass HAVAL and Step-Reduced MD5 -- Cryptanalysis of Tweaked Versions of SMASH and Reparation…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2005
    Table of Contents: “… Attacks on the Nonlinear Filters -- Non-randomness of the Full 4 and 5-Pass HAVAL -- Email Security…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 10
    Published 2003
    Table of Contents: “… Extenders for UOWHF -- Cryptanalysis of 3-Pass HAVAL -- Group Signatures -- Efficient Group Signatures…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 11
    Published 2009
    Table of Contents: “… on the HMAC/NMAC Based on 3 and 4-Pass HAVAL -- Cryptanalysis -- Memoryless Related-Key Boomerang Attack…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 12
    Published 2007
    Table of Contents: “… Privacy for Mobile Communications -- How to Find Many Collisions of 3-Pass HAVAL -- A Secure Threshold…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 13
    Published 2008
    Table of Contents: “… and Range Proofs -- Cryptographic Hash Functions II -- Preimage Attacks on 3, 4, and 5-Pass HAVAL -- How…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 14
    Published 2009
    Table of Contents: “… Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 15
    Published 2002
    Table of Contents: “… Oblivious Transfer -- Cryptanalysis II -- On the Security of Reduced Versions of 3-Pass HAVAL…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 16
    Published 2005
    Table of Contents: “… of MD4, MD5 and HAVAL -- Cryptanalysis of PASS II and MiniPass -- Simple Power Analysis on Fast Modular…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search