Completed
Cryptographic Hash Functions
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
New Attacks on the Concatenation and XOR Hash Combiners
Automatically move to the next video in the Classroom when playback concludes
- 1 Cryptographic Hash Functions
- 2 Concatenating Hash Functions
- 3 Hash Functions in Practice
- 4 Iterated Hash Functions
- 5 In This Work
- 6 Hash Functions (2003)
- 7 Hash Functions (Joux, 2004)
- 8 Hash Functions (Kelsey and Schneier, 2005)
- 9 Second Preimage Attack on MD
- 10 Hash Functions (2015)
- 11 Second Preimage Attack on Concatenated MD
- 12 A Different Approach
- 13 Deep Iterates
- 14 The Algorithm
- 15 Conclusions