South China Normal University

Displaying 1-1 of 1 results

  • White Papers // Jun 2011

    Improved Related-Key Boomerang Distinguishing Attack of Threefish-256

    In cryptology, hash functions are designed to protect data integrity by producing a fixed-length digest from an arbitrary-length message. Based on Wang et al.'s breakthrough in hash cryptanalysis, the widely-used hash functions (MD5, SHA-1, etc.,) have been seriously attacked. If SHA-256 and SHA-512 were to be broken, the industry does...

    Provided By South China Normal University

  • White Papers // Jun 2011

    Improved Related-Key Boomerang Distinguishing Attack of Threefish-256

    In cryptology, hash functions are designed to protect data integrity by producing a fixed-length digest from an arbitrary-length message. Based on Wang et al.'s breakthrough in hash cryptanalysis, the widely-used hash functions (MD5, SHA-1, etc.,) have been seriously attacked. If SHA-256 and SHA-512 were to be broken, the industry does...

    Provided By South China Normal University