Difference between revisions of "The eHash Main Page"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) |
Crechberger (talk | contribs) |
||
Line 1: | Line 1: | ||
− | + | = Introduction = | |
An introducion to cryptographic hash functions. | An introducion to cryptographic hash functions. | ||
Line 7: | Line 7: | ||
− | + | = The Hash Function Zoo = | |
On this page you can find a collection of existing hash functions. | On this page you can find a collection of existing hash functions. | ||
Line 13: | Line 13: | ||
[http://ehash.iaik.tugraz.at/index.php/HashFunctionZoo Hash Function Zoo] | [http://ehash.iaik.tugraz.at/index.php/HashFunctionZoo Hash Function Zoo] | ||
− | + | = Generic Attacks on Hash Functions = | |
Line 20: | Line 20: | ||
[http://ehash.iaik.tugraz.at/index.php/GenericAttacksMerkleDamgaard Generic Attacks on the Merkle-Damgaard Construction] | [http://ehash.iaik.tugraz.at/index.php/GenericAttacksMerkleDamgaard Generic Attacks on the Merkle-Damgaard Construction] | ||
+ | = Editors corner = | ||
== Some How Tos == | == Some How Tos == |
Revision as of 21:51, 21 March 2008
Contents
1 Introduction
An introducion to cryptographic hash functions.
2 The Hash Function Zoo
On this page you can find a collection of existing hash functions.
3 Generic Attacks on Hash Functions
Generic Attacks on Hash Functions
Generic Attacks on the Merkle-Damgaard Construction
4 Editors corner
4.1 Some How Tos
Some hints how to work with math environments and bibtex
4.2 Getting started
ECRYPT is a Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at his or her sole risk and liability.