下载此文档

杂凑函数的攻击方法研究.pdf


文档分类:IT计算机 | 页数:约91页 举报非法文档有奖
1/91
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/91 下载此文档
文档列表 文档介绍
A Dissertation Submitted to
PLA Information Engineering University
for the Degree of Doctor of Military Science



Research on the Attack Methods of the Hash
Functions




Candidate: Chen Shiwei
Supervisor: Prof. Jin Chenhui















Apr. 2012
信息工程大学博士学位论文
目 录
摘 要··············································································································································I
Abstract ········································································································································· III
第一章 绪论···································································································································1
研究背景和意义···············································································································1
研究现状与问题···············································································································2
杂凑函数的迭代结构的研究现状··········································································2
SHA-3 候选算法及其分析现状 ·············································································7
基于杂凑函数的消息认证码的安全性分析························································13
主要研究成果·······················

杂凑函数的攻击方法研究 来自淘豆网www.taodocs.com转载请标明出处.

非法内容举报中心
文档信息
  • 页数91
  • 收藏数0 收藏
  • 顶次数0
  • 上传人陈潇睡不醒
  • 文件大小1.49 MB
  • 时间2021-10-30