Changes between Version 39 and Version 40 of Bibliography


Ignore:
Timestamp:
2009-07-31T16:05:07Z (15 years ago)
Author:
zooko
Comment:

add note about AES-128 and Salsa20 on defectoscopy.com

Legend:

Unmodified
Added
Removed
Modified
  • Bibliography

    v39 v40  
    1616[https://online.tu-graz.ac.at/tug_online/voe_main2.getvolltext?pDocumentNr=81263 Cryptanalysis of the Tiger Hash Function] by Mendel and RIjmen
    1717
    18 [http://defectoscopy.com/results.html defectoscopy.com] a table of semi-automated cryptanalysis results from the inventors of EnRUPT.  This technique has not been peer-reviewed by other cryptographers.  I (Zooko) can't judge how valid it is.  Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool.  MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure.
     18[http://defectoscopy.com/results.html defectoscopy.com] a table of semi-automated cryptanalysis results from the inventors of EnRUPT.  This technique has not been peer-reviewed by other cryptographers.  I (Zooko) can't judge how valid it is.  Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool.  MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure.  AES-128 is predicted to be insecure.  Salsa20 is predicted to be secure.
    1919
    2020=== Elliptic Curve Cryptography ===