Ве молиме користете го овој идентификатор да го цитирате или поврзете овој запис: http://hdl.handle.net/20.500.12188/23871
DC FieldValueLanguage
dc.contributor.authorMarkovski, Smileen_US
dc.contributor.authorMileva, Aleksandraen_US
dc.contributor.authorDimitrova, Vesnaen_US
dc.contributor.authorGligoroski, Daniloen_US
dc.date.accessioned2022-10-27T12:54:22Z-
dc.date.available2022-10-27T12:54:22Z-
dc.date.issued2009-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/23871-
dc.description.abstractA collision attack on NaSHA-512 was proposed by L. Ji et al. The claimed complexity of the attack is 2192. The proposed attack is realized by using a suitable differential pattern. In this note we show that the correct result that can be inferred from their differential pattern is in fact a conditional one. It can be stated correctly as follows: A collision attack on NaSHA-512 of complexity k = 1, 2, . . . , 2 320 can be performed with an unknown probability of success pk, where 0 ≤ p1 ≤ p2 ≤ p2 320 ≤ 1. Consequently, the attack proposed by L. Ji et al. can be considered only as a direction how a possible collision attack on NaSHA-512 could be realized. The birthday attack remains the best possible attack on NaSHA-512.en_US
dc.relation.ispartofCryptology ePrint Archiveen_US
dc.titleOn a conditional collision attack on nasha-512en_US
dc.typeJournal Articleen_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Natural Sciences and Mathematics-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Journal Articles
Files in This Item:
File Опис SizeFormat 
2009-034.pdf131.32 kBAdobe PDFView/Open
Прикажи едноставен запис

Page view(s)

75
checked on 3.5.2025

Download(s)

10
checked on 3.5.2025

Google ScholarTM

Проверете


Записите во DSpace се заштитени со авторски права, со сите права задржани, освен ако не е поинаку наведено.