The evaluation report of sha-256 crypt analysis hash function

AL Selvakumar, CS Ganadhas - 2009 International Conference …, 2009 - ieeexplore.ieee.org
This paper describes the study of cryptographic hash functions, one of the most important
classes of primitives used in recent techniques in cryptography. The main aim is the …

MD5 is weaker than weak: Attacks on concatenated combiners

F Mendel, C Rechberger, M Schläffer - … on the Theory and Application of …, 2009 - Springer
We consider a long standing problem in cryptanalysis: attacks on hash function combiners.
In this paper, we propose the first attack that allows collision attacks on combiners with a …

[HTML][HTML] A novel time-memory trade-off method for password recovery

VLL Thing, HM Ying - Digital investigation, 2009 - Elsevier
As users become increasingly aware of the need to adopt strong password, it hinders the
digital forensics investigations due to the password protection of potential evidence data. In …

Efficient access control for wireless sensor data

A Sorniotti, R Molva, L Gomez, C Trefois… - International Journal of …, 2009 - Springer
Although very developed in many sectors (databases, filesystems), access control schemes
are still somewhat elusive when it comes to wireless sensor networks. However, it is clear …

Meet-in-the-middle preimage attacks on double-branch hash functions: Application to RIPEMD and others

Y Sasaki, K Aoki - Information Security and Privacy: 14th Australasian …, 2009 - Springer
We describe preimage attacks on several double-branch hash functions. We first present
meet-in-the-middle preimage attacks on RIPEMD, whose output length is 128 bits and …

Method and system for generating time-based identifiers

D Bohm, MG Lamming, RN Mayo, JA Morgan… - US Patent …, 2009 - Google Patents
US7581108B1 - Method and system for generating time-based identifiers - Google Patents
US7581108B1 - Method and system for generating time-based identifiers - Google Patents …

[PDF][PDF] Design and analysis of fair content tracing protocols

GS Poh - 2009 - researchgate.net
The work in this thesis examines protocols designed to address the issues of tracing illegal
distribution of digital content in a fair manner. In digital content distribution, a client requests …

Finding collisions for a 45-step simplified HAS-V

N Mouha, C De Canniere, S Indesteege… - … Workshop on Information …, 2009 - Springer
Recent attacks on hash functions start by constructing a differential characteristic. By finding
message pairs that satisfy this characteristic, a collision can be found. This paper describes …

远端非可信平台Agent 完整性保护机制研究与设计

杨翠, 谭成翔 - 计算机应用, 2009 - joca.cn
服务端采用Agent 部署移动代码实现业务交互存在诸多安全问题. 为提高软件的可信度,
确保Agent 在复杂运行环境中可靠运行, 通过分析传统的完整性验证机制, 借鉴身份认证 …

[PDF][PDF] Logical analysis and verification of cryptographic protocols

M Kourjieh - These de doctorat, Université Paul Sabatier, Toulouse …, 2009 - irit.fr
Logical Analysis and Verification of Cryptographic Protocols Page 1 Logical Analysis and
Verification of Cryptographic Protocols Thesis presented and defended by MOUNIRA …