Dergi makalesi Açık Erişim

A SECOND PRE-IMAGE ATTACK AND A COLLISION ATTACK TO CRYPTOGRAPHIC HASH FUNCTION LUX

Sulak, Fatih; Kocak, Onur; Saygi, Elif; Ogunc, Merve; Bozdemir, Beyza


DataCite XML

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="URL">https://aperta.ulakbim.gov.tr/record/90125</identifier>
  <creators>
    <creator>
      <creatorName>Sulak, Fatih</creatorName>
      <givenName>Fatih</givenName>
      <familyName>Sulak</familyName>
      <affiliation>Atilim Univ, Dept Math, Ankara, Turkey</affiliation>
    </creator>
    <creator>
      <creatorName>Kocak, Onur</creatorName>
      <givenName>Onur</givenName>
      <familyName>Kocak</familyName>
      <affiliation>TUBITAK BILGEM, TR-41470 Gebze, Kocaeli, Turkey</affiliation>
    </creator>
    <creator>
      <creatorName>Saygi, Elif</creatorName>
      <givenName>Elif</givenName>
      <familyName>Saygi</familyName>
      <affiliation>Hacettepe Univ, Elementary Math Educ, Dept Basic Educ Div, Ankara, Turkey</affiliation>
    </creator>
    <creator>
      <creatorName>Ogunc, Merve</creatorName>
      <givenName>Merve</givenName>
      <familyName>Ogunc</familyName>
      <affiliation>METU, Cryptog Dept, Inst Appl Math, Ankara, Turkey</affiliation>
    </creator>
    <creator>
      <creatorName>Bozdemir, Beyza</creatorName>
      <givenName>Beyza</givenName>
      <familyName>Bozdemir</familyName>
      <affiliation>METU, Cryptog Dept, Inst Appl Math, Ankara, Turkey</affiliation>
    </creator>
  </creators>
  <titles>
    <title>A Second Pre-Image Attack And A Collision Attack To Cryptographic Hash Function Lux</title>
  </titles>
  <publisher>Aperta</publisher>
  <publicationYear>2017</publicationYear>
  <dates>
    <date dateType="Issued">2017-01-01</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Journal article</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://aperta.ulakbim.gov.tr/record/90125</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.1501/Commual_0000000794</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="http://www.opendefinition.org/licenses/cc-by">Creative Commons Attribution</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of cryptography is the hash functions. Hash functions are known as the digital fingerprints. Following the recent attacks on the widely used hash functions MD5 and SHA-1 and the increase in computational power, the need for a new hash function standard has arisen. For this purpose, US National Institute of Standards and Technology (NIST) had announced a competition to select a standard hash function algorithm which would eventually become the Third Secure Hash Algorithm, SHA-3. Initially 64 algorithms were submitted to NIST and 51 of them were announced as the First Round Candidates. After an analysis period, 14 of these algorithms were announced as the Second Round Candidates, and 5 algorithms were announced as Finalists. The winner of the competition, Keccak, was announced in 2012.</description>
  </descriptions>
</resource>
36
9
görüntülenme
indirilme
Görüntülenme 36
İndirme 9
Veri hacmi 2.3 kB
Tekil görüntülenme 29
Tekil indirme 9

Alıntı yap