1 / 91
文档名称:

杂凑函数的攻击方法研究.pdf

格式:pdf   大小:1,528KB   页数:91页
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

杂凑函数的攻击方法研究.pdf

上传人:陈潇睡不醒 2021/10/30 文件大小:1.49 MB

下载得到文件列表

杂凑函数的攻击方法研究.pdf

文档介绍

文档介绍:A Dissertation Submitted to
PLA Information Engineering University
for the Degree of Doctor of Military Science



Research on the Attack Methods of the Hash
Functions




Candidate: Chen Shiwei
Supervisor: Prof. Jin Chenhui















Apr. 2012
信息工程大学博士学位论文
目 录
摘 要··············································································································································I
Abstract ········································································································································· III
第一章 绪论···································································································································1
研究背景和意义···············································································································1
研究现状与问题···············································································································2
杂凑函数的迭代结构的研究现状··········································································2
SHA-3 候选算法及其分析现状 ·············································································7
基于杂凑函数的消息认证码的安全性分析························································13
主要研究成果·······················