A Dissertation Submitted to
PLA Information Engineering University
for the Degree of Doctor of Military Science
Research on the Attack Methods of the Hash
Functions
Candidate: Chen Shiwei
Supervisor: Prof. Jin Chenhui
Apr. 2012
信息工程大学博士学位论文
目 录
摘 要··············································································································································I
Abstract ········································································································································· III
第一章 绪论···································································································································1
研究背景和意义···············································································································1
研究现状与问题···············································································································2
杂凑函数的迭代结构的研究现状··········································································2
SHA-3 候选算法及其分析现状 ·············································································7
基于杂凑函数的消息认证码的安全性分析························································13
主要研究成果·······················
杂凑函数的攻击方法研究 来自淘豆网www.taodocs.com转载请标明出处.