您当前所在位置: 首页 > 学者
在线提示

恭喜!关注成功

在线提示

确认取消关注该学者?

邀请同行关闭

只需输入对方姓名和电子邮箱,就可以邀请你的同行加入中国科技论文在线。

真实姓名:

电子邮件:

尊敬的

我诚挚的邀请你加入中国科技论文在线,点击

链接,进入网站进行注册。

添加个性化留言

已为您找到该学者10条结果 成果回收站

上传时间

2006年09月21日

【期刊论文】Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD

王小云, Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu

,-0001,():

-1年11月30日

摘要

  • 1636浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 201下载

  • 0

  • 引用

上传时间

2006年09月21日

【期刊论文】Finding Collisions in the Full SHA-1

王小云, Xiaoyun Wang*, Yiqun Lisa Yin, and Hongbo Yu

Crypto 2005, LNCS 3621, pp. 17-36, 2005.,-0001,():

-1年11月30日

摘要

In this paper, we present new collision search attacks on the hash function SHA-1. We show that collisions of SHA-1 can be found with complexity less than 269 hash operations. This is the first attack on the full 80-step SHA-1 with complexity less than the 280 theoretical bound.

Hash functions,, collision search attacks,, SHA-1,, SHA-0

上传时间

2006年09月21日

【期刊论文】Efficient Collision Search Attacks on SHA-0

王小云, Xiaoyun Wang, Hongbo Yu, and Yiqun Lisa Yin

Crypto 2005, LNCS 3621, pp. 1-16, 2005.,-0001,():

-1年11月30日

摘要

In this paper, we present new techniques for collision search in the hash function SHA-0. Using the new techniques, we can find collisions of the full 80-step SHA-0 with complexity less than 239 hash operations.

Hash functions,, Collision search attacks,, SHA-0,, SHA-1.,

上传时间

2006年09月21日

【期刊论文】Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms

王小云, X. Y. Wang, L. C. Hui, K. P. Chow, W. W. Tsang, C. F. Chong, and H. W. Chan

PKC 2000, LNCS 1751, pp. 167-177, 2000.,-0001,():

-1年11月30日

摘要

In this paper, we present another tree-structure signature scheme based on discrete logarithm problem modulo p, where p is a large prime. The basic signing algorithm is the original ELGmal signature scheme. The scheme attains ideal security, i. e, finding existential forgeries under adaptively chosen message attacks is equivalent to solving the discrete logarithm of any random integer y∈Z*p. The scheme is also efficient, it can be implemented almost as efficiently as the original ELGamal signature scheme. We can regard the scheme as an application of ELGamal signature scheme in tree-structure signature schemes.

上传时间

2006年09月21日

【期刊论文】The Second-Preimage Attack on MD4

王小云, Hongbo Yu, Gaoli Wang, Guoyan Zhang, and Xiaoyun Wang

CANS 2005, LNCS 3810, pp. 1-12, 2005.,-0001,():

-1年11月30日

摘要

In Eurocrypt'05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicable to explore the secondpreimage of MD4. About the second-preimage attack, they showed that a random message was a weak message with probability 2−122 and it only needed a one-time MD4 computation to find the second-preimage corresponding to the weak message. A weak message means that there exits a more efficient attack than the brute force attack to find its secondpreimage. In this paper, we find another new collision differential path which can be used to find the second-preimage for more weak messages. For any random message, it is a weak message with probability 2−56, and it can be converted into a weak message by message modification techniques with about 227 MD4 computations. Furthermore, the original message is close to the resulting message (weak message), i. e, the Hamming weight of the difference for two messages is about 44.

Hash function,, collision differential path,, second-preimage,, weak message.,

合作学者

  • 王小云 邀请

    山东大学,山东

    尚未开通主页