/[gentoo]/xml/htdocs/proj/en/glep/glep-0059.txt
Gentoo

Diff of /xml/htdocs/proj/en/glep/glep-0059.txt

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.1 Revision 1.2
1GLEP: 59 1GLEP: 59
2Title: Manifest2 hash policies and security implications 2Title: Manifest2 hash policies and security implications
3Version: $Revision: 1.1 $ 3Version: $Revision: 1.2 $
4Last-Modified: $Date: 2008/10/21 23:30:47 $ 4Last-Modified: $Date: 2008/10/22 17:59:43 $
5Author: Robin Hugh Johnson <robbat2@gentoo.org>, 5Author: Robin Hugh Johnson <robbat2@gentoo.org>,
6Status: Draft 6Status: Draft
7Type: Standards Track 7Type: Standards Track
8Content-Type: text/x-rst 8Content-Type: text/x-rst
9Requires: 44 9Requires: 44
132[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective 132[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective
133 Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive, 133 Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive,
134 Report 2004/204. Available online from: 134 Report 2004/204. Available online from:
135 http://eprint.iacr.org/2004/207.pdf 135 http://eprint.iacr.org/2004/207.pdf
136 136
137[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash Functions 137[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash
138 - Application to Cascaded Constructions;" Proceedings of CRYPTO 2004, 138 Functions - Application to Cascaded Constructions;" Proceedings of
139 Franklin, M. (Ed); Lecture Notes in Computer Science 3152, pp. 139 CRYPTO 2004, Franklin, M. (Ed); Lecture Notes in Computer Science
140 306-316. Available online from: 140 3152, pp. 306-316. Available online from:
141 http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf 141 http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf
142 142
143[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions 143[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions
144 Within a Minute". Cryptology ePrint Archive, Report 2006/105. 144 Within a Minute". Cryptology ePrint Archive, Report 2006/105.
145 Available online from: http://eprint.iacr.org/2006/105.pdf 145 Available online from: http://eprint.iacr.org/2006/105.pdf

Legend:
Removed from v.1.1  
changed lines
  Added in v.1.2

  ViewVC Help
Powered by ViewVC 1.1.20