[PDF][PDF] 缩减RIPEMD-128 分析

王高丽, 王美琴 - 软件学报, 2008 - jos.org.cn
… two different and independent parallel parts, with which the results in each application of the
… our collision probability. We show a cryptanalysis on reduced RIPEMD-128 which can find a …

[PDF][PDF] MD5 (O, 伪, 8c, 8c)-消息对Pollard's rho 搜索算法设计

王王五, 周林, 徐良华 - 信息工程大学学报, 2011 - xxgcxb.cnjournals.com
… method , designs the serial and parallel Pollard' s rho algorithms for searching (0 , 8b , δc ,8c
) … Vulnerability of software integrity and code signing applications to chosen-prefix collisions

ExtendedMD4 的碰撞攻击和RIPEMD 的伪原根攻击

王高丽 - 计算机科学技术学报, 2013 - jcst.ict.ac.cn
… family and RIPEMD-family is that RIPEMD-family uses two parallel branches of … is based
on differential cryptanalysis[31]. Wang’s method was also adopted in searching the second…

非平衡r- 碰撞问题的高效解决算法

邹剑, 李金春, 董乐, 李灵琛 - Journal of Cryptologic Research, 2023 - search.proquest.com
… At present, the problem of r-collision in the unbalanced … is proposed to find an unbalanced
r-collision of r different and … previous 3-collision algorithm, the parallel collision search (PCS) …

一些密碼元件之分析與設計

李鎮宇, 林祝興 - 2012 - ir.lib.nycu.edu.tw
… we apply linear cryptanalysis and differential cryptanalysis to the … We apply genetic algorithms
to find the near-optimal message … They are widely used in a variety of applications such as …

橢圓曲線密碼系統之曲線安全性研究

江前佑 - 2008 - tdr.lib.ntu.edu.tw
… to find the criteria of weak curves and weak base fields. Except for the brute force attack, recent
cryptanalysis … This method is similar to the MOV attack which uses some kind of pairing to …

解佈於二元體之多項式方程組之快速窮舉法

周彤 - 2010 - tdr.lib.ntu.edu.tw
… direct application of system solving is algebraic cryptanalysis… algorithms are usually highly
parallelizable, the trend in parallel … On the theoretical side, we present an exhaustive search

在P2P 網路以片段資料汙染來保護版權檔案

邱創揚, 王俊鑫 - … of Information Technology and Applications (資訊 …, 2010 - airitilibrary.com
… 行討論與評分,下載者透過這些機制來尋找檔案的 方法常稱為exact-match searching [9][11].與
只透過關鍵字來尋找檔案的方法相比, exact-match searching 讓下載者可以透過更多的 資訊來…

階層叢集式行動隨意網路之動態存取控制機制

黃南翔, 曹偉駿 - 2010 - people.dyu.edu.tw
… Networking and Applications (pp. 376–379).Chang, CC, Hwang, RJ, & Wu, TC (1992). …
Parallel Collision Search With Cryptanalysis Applications. Journal of Cryptology, 12, 1-28.…

TuLP: 一类面向医疗传感器网络的轻量级消息认证码

龚征, 唐韶华, 朱博 - 计算机科学技术学报, 2014 - jcst.ict.ac.cn
… BSN applications, but also hold on authenticity-aware WSN … attack on internal states to
find a collision. Although this “… internal collisions from the linear and differential cryptanalysis