...
首页> 外文期刊>IEEE security & privacy >Cryptographic hash standards: where do we go from here?
【24h】

Cryptographic hash standards: where do we go from here?

机译:加密哈希标准:我们从这里去哪里?

获取原文
获取原文并翻译 | 示例
           

摘要

Successful attacks against the two most commonly used cryptographic hash functions, MD5 and SHA-1, have triggered a kind of feeding frenzy in the cryptographic community. Many researchers are now working on hash function attacks, and we can expect new results in this area for the next several years. This article discusses the SHA-1 attack and the US National Institute of Standards and Technology's (NIST's) plans for SHA-1 and hash functions in general
机译:对两个最常用的加密哈希函数MD5和SHA-1的成功攻击引发了加密界的一种狂热。现在,许多研究人员正在研究散列函数攻击,我们可以期望在未来几年内在这一领域取得新的成果。本文讨论了SHA-1攻击以及美国国家标准技术研究院(NIST)针对SHA-1和哈希函数的总体计划

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号