Unlimited WordPress themes, plugins & video downloads!

Research

Research – Transferable State Attack On Iterated Hashing Functions

This paper describes an attack of the iterated use of hashing functions used as key stretching algorithms where the state of a hash can be transferred to the next hash function.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/115079/TransferableStateAttackonIteratedHashingFunctions.pdf

Source: https://packetstormsecurity.com/files/115079/Transferable-State-Attack-On-Iterated-Hashing-Functions.html

Related posts
Research

Research - RiseCON 2014 Call For Papers

Research

Research - Rooted CON 2012 Call For Papers

Research

Research - RSA Asymmetric Polymorphic Shellcode

Research

Research - RVAsec 2017 Call For Papers

Sign up for our Newsletter and
stay informed