收藏本站
收藏 | 投稿 | 手机打开
二维码
手机客户端打开本文

New strategy for searching disturbance vector of SHA-1 collision attack

Hao FENG  Guang ZENG  Wenbao HAN  Yang YANG  
【摘要】:正Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2~(38)based on the following two properties of disturbance vectors.One property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance vectors.The other property requires all the differences of the active bit positions of the first 16-step disturbance vectors to be

知网文化
【相似文献】
中国期刊全文数据库 前2条
1 ;New Model and Simulation of Condenser for Ship Nuclear Power Plant[J];Journal of Marine Science and Application;2002年01期
2 姜景杰;甄新平;李全善;魏环;靳其兵;潘立登;;An Identification Method Based on the Improved NLJ Algorithm and Its Application[J];Chinese Journal of Chemical Engineering;2007年01期
中国重要会议论文全文数据库 前1条
1 ;Design of RFDF for Singular Systems with State Delay and Parameter Uncertainty[A];2008中国仪器仪表与测控技术进展大会论文集(Ⅰ)[C];2008年
 快捷付款方式  订购知网充值卡  订购热线  帮助中心
  • 400-819-9993
  • 010-62982499
  • 010-62783978