/[gentoo]/xml/htdocs/proj/en/glep/glep-0059.html
Gentoo

Diff of /xml/htdocs/proj/en/glep/glep-0059.html

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.1 Revision 1.2
25<tbody valign="top"> 25<tbody valign="top">
26<tr class="field"><th class="field-name">GLEP:</th><td class="field-body">59</td> 26<tr class="field"><th class="field-name">GLEP:</th><td class="field-body">59</td>
27</tr> 27</tr>
28<tr class="field"><th class="field-name">Title:</th><td class="field-body">Manifest2 hash policies and security implications</td> 28<tr class="field"><th class="field-name">Title:</th><td class="field-body">Manifest2 hash policies and security implications</td>
29</tr> 29</tr>
30<tr class="field"><th class="field-name">Version:</th><td class="field-body">1.11</td> 30<tr class="field"><th class="field-name">Version:</th><td class="field-body">1.2</td>
31</tr> 31</tr>
32<tr class="field"><th class="field-name">Last-Modified:</th><td class="field-body"><a class="reference external" href="http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/proj/en/glep/glep-0059.txt?cvsroot=gentoo">2008/07/13 02:23:36</a></td> 32<tr class="field"><th class="field-name">Last-Modified:</th><td class="field-body"><a class="reference external" href="http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/proj/en/glep/glep-0059.txt?cvsroot=gentoo">2008/10/22 17:59:43</a></td>
33</tr> 33</tr>
34<tr class="field"><th class="field-name">Author:</th><td class="field-body">Robin Hugh Johnson &lt;robbat2&#32;&#97;t&#32;gentoo.org&gt;,</td> 34<tr class="field"><th class="field-name">Author:</th><td class="field-body">Robin Hugh Johnson &lt;robbat2&#32;&#97;t&#32;gentoo.org&gt;,</td>
35</tr> 35</tr>
36<tr class="field"><th class="field-name">Status:</th><td class="field-body">Draft</td> 36<tr class="field"><th class="field-name">Status:</th><td class="field-body">Draft</td>
37</tr> 37</tr>
184<a class="reference external" href="http://crypto.stanford.edu/~dabo/abstracts/hashing.html">http://crypto.stanford.edu/~dabo/abstracts/hashing.html</a></dd> 184<a class="reference external" href="http://crypto.stanford.edu/~dabo/abstracts/hashing.html">http://crypto.stanford.edu/~dabo/abstracts/hashing.html</a></dd>
185<dt>[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). &quot;On Corrective</dt> 185<dt>[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). &quot;On Corrective</dt>
186<dd>Patterns for the SHA-2 Family&quot;. CRYPTO 2004 Cryptology ePrint Archive, 186<dd>Patterns for the SHA-2 Family&quot;. CRYPTO 2004 Cryptology ePrint Archive,
187Report 2004/204. Available online from: 187Report 2004/204. Available online from:
188<a class="reference external" href="http://eprint.iacr.org/2004/207.pdf">http://eprint.iacr.org/2004/207.pdf</a></dd> 188<a class="reference external" href="http://eprint.iacr.org/2004/207.pdf">http://eprint.iacr.org/2004/207.pdf</a></dd>
189<dt>[J04] Joux, Antoie. (2004). &quot;Multicollisions in Iterated Hash Functions</dt> 189<dt>[J04] Joux, Antoie. (2004). &quot;Multicollisions in Iterated Hash</dt>
190<dd><ul class="first simple">
191<li>Application to Cascaded Constructions;&quot; Proceedings of CRYPTO 2004,</li> 190<dd>Functions - Application to Cascaded Constructions;&quot; Proceedings of
192</ul> 191CRYPTO 2004, Franklin, M. (Ed); Lecture Notes in Computer Science
193<div class="system-message">
194<p class="system-message-title">System Message: WARNING/2 (<tt class="docutils">glep-0059.txt</tt>, line 139)</p>
195Bullet list ends without a blank line; unexpected unindent.</div>
196<p class="last">Franklin, M. (Ed); Lecture Notes in Computer Science 3152, pp.
197306-316. Available online from: 1923152, pp. 306-316. Available online from:
198<a class="reference external" href="http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf">http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf</a></p> 193<a class="reference external" href="http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf">http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf</a></dd>
199</dd>
200<dt>[K06a] Klima, V. (2006). &quot;Tunnels in Hash Functions: MD5 Collisions</dt> 194<dt>[K06a] Klima, V. (2006). &quot;Tunnels in Hash Functions: MD5 Collisions</dt>
201<dd>Within a Minute&quot;. Cryptology ePrint Archive, Report 2006/105. 195<dd>Within a Minute&quot;. Cryptology ePrint Archive, Report 2006/105.
202Available online from: <a class="reference external" href="http://eprint.iacr.org/2006/105.pdf">http://eprint.iacr.org/2006/105.pdf</a></dd> 196Available online from: <a class="reference external" href="http://eprint.iacr.org/2006/105.pdf">http://eprint.iacr.org/2006/105.pdf</a></dd>
203<dt>[K06b] Klima, V. (2006). &quot;Note and links to high-speed MD5 collision</dt> 197<dt>[K06b] Klima, V. (2006). &quot;Note and links to high-speed MD5 collision</dt>
204<dd>proof of concept tools&quot;. Available online from: 198<dd>proof of concept tools&quot;. Available online from:
240 234
241</div> 235</div>
242<div class="footer"> 236<div class="footer">
243<hr class="footer" /> 237<hr class="footer" />
244<a class="reference external" href="glep-0059.txt">View document source</a>. 238<a class="reference external" href="glep-0059.txt">View document source</a>.
245Generated on: 2008-10-21 23:29 UTC. 239Generated on: 2008-10-22 18:02 UTC.
246Generated by <a class="reference external" href="http://docutils.sourceforge.net/">Docutils</a> from <a class="reference external" href="http://docutils.sourceforge.net/rst.html">reStructuredText</a> source. 240Generated by <a class="reference external" href="http://docutils.sourceforge.net/">Docutils</a> from <a class="reference external" href="http://docutils.sourceforge.net/rst.html">reStructuredText</a> source.
247 241
248</div> 242</div>
249</body> 243</body>
250</html> 244</html>

Legend:
Removed from v.1.1  
changed lines
  Added in v.1.2

  ViewVC Help
Powered by ViewVC 1.1.20