… | |
… | |
25 | <tbody valign="top"> |
25 | <tbody valign="top"> |
26 | <tr class="field"><th class="field-name">GLEP:</th><td class="field-body">59</td> |
26 | <tr class="field"><th class="field-name">GLEP:</th><td class="field-body">59</td> |
27 | </tr> |
27 | </tr> |
28 | <tr class="field"><th class="field-name">Title:</th><td class="field-body">Manifest2 hash policies and security implications</td> |
28 | <tr class="field"><th class="field-name">Title:</th><td class="field-body">Manifest2 hash policies and security implications</td> |
29 | </tr> |
29 | </tr> |
30 | <tr class="field"><th class="field-name">Version:</th><td class="field-body">1.11</td> |
30 | <tr class="field"><th class="field-name">Version:</th><td class="field-body">1.2</td> |
31 | </tr> |
31 | </tr> |
32 | <tr class="field"><th class="field-name">Last-Modified:</th><td class="field-body"><a class="reference external" href="http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/proj/en/glep/glep-0059.txt?cvsroot=gentoo">2008/07/13 02:23:36</a></td> |
32 | <tr class="field"><th class="field-name">Last-Modified:</th><td class="field-body"><a class="reference external" href="http://www.gentoo.org/cgi-bin/viewcvs.cgi/xml/htdocs/proj/en/glep/glep-0059.txt?cvsroot=gentoo">2008/10/22 17:59:43</a></td> |
33 | </tr> |
33 | </tr> |
34 | <tr class="field"><th class="field-name">Author:</th><td class="field-body">Robin Hugh Johnson <robbat2 at gentoo.org>,</td> |
34 | <tr class="field"><th class="field-name">Author:</th><td class="field-body">Robin Hugh Johnson <robbat2 at gentoo.org>,</td> |
35 | </tr> |
35 | </tr> |
36 | <tr class="field"><th class="field-name">Status:</th><td class="field-body">Draft</td> |
36 | <tr class="field"><th class="field-name">Status:</th><td class="field-body">Draft</td> |
37 | </tr> |
37 | </tr> |
… | |
… | |
184 | <a class="reference external" href="http://crypto.stanford.edu/~dabo/abstracts/hashing.html">http://crypto.stanford.edu/~dabo/abstracts/hashing.html</a></dd> |
184 | <a class="reference external" href="http://crypto.stanford.edu/~dabo/abstracts/hashing.html">http://crypto.stanford.edu/~dabo/abstracts/hashing.html</a></dd> |
185 | <dt>[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective</dt> |
185 | <dt>[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective</dt> |
186 | <dd>Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive, |
186 | <dd>Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive, |
187 | Report 2004/204. Available online from: |
187 | Report 2004/204. Available online from: |
188 | <a class="reference external" href="http://eprint.iacr.org/2004/207.pdf">http://eprint.iacr.org/2004/207.pdf</a></dd> |
188 | <a class="reference external" href="http://eprint.iacr.org/2004/207.pdf">http://eprint.iacr.org/2004/207.pdf</a></dd> |
189 | <dt>[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash Functions</dt> |
189 | <dt>[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash</dt> |
190 | <dd><ul class="first simple"> |
|
|
191 | <li>Application to Cascaded Constructions;" Proceedings of CRYPTO 2004,</li> |
190 | <dd>Functions - Application to Cascaded Constructions;" Proceedings of |
192 | </ul> |
191 | CRYPTO 2004, Franklin, M. (Ed); Lecture Notes in Computer Science |
193 | <div class="system-message"> |
|
|
194 | <p class="system-message-title">System Message: WARNING/2 (<tt class="docutils">glep-0059.txt</tt>, line 139)</p> |
|
|
195 | Bullet list ends without a blank line; unexpected unindent.</div> |
|
|
196 | <p class="last">Franklin, M. (Ed); Lecture Notes in Computer Science 3152, pp. |
|
|
197 | 306-316. Available online from: |
192 | 3152, pp. 306-316. Available online from: |
198 | <a class="reference external" href="http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf">http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf</a></p> |
193 | <a class="reference external" href="http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf">http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf</a></dd> |
199 | </dd> |
|
|
200 | <dt>[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions</dt> |
194 | <dt>[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions</dt> |
201 | <dd>Within a Minute". Cryptology ePrint Archive, Report 2006/105. |
195 | <dd>Within a Minute". Cryptology ePrint Archive, Report 2006/105. |
202 | Available online from: <a class="reference external" href="http://eprint.iacr.org/2006/105.pdf">http://eprint.iacr.org/2006/105.pdf</a></dd> |
196 | Available online from: <a class="reference external" href="http://eprint.iacr.org/2006/105.pdf">http://eprint.iacr.org/2006/105.pdf</a></dd> |
203 | <dt>[K06b] Klima, V. (2006). "Note and links to high-speed MD5 collision</dt> |
197 | <dt>[K06b] Klima, V. (2006). "Note and links to high-speed MD5 collision</dt> |
204 | <dd>proof of concept tools". Available online from: |
198 | <dd>proof of concept tools". Available online from: |
… | |
… | |
240 | |
234 | |
241 | </div> |
235 | </div> |
242 | <div class="footer"> |
236 | <div class="footer"> |
243 | <hr class="footer" /> |
237 | <hr class="footer" /> |
244 | <a class="reference external" href="glep-0059.txt">View document source</a>. |
238 | <a class="reference external" href="glep-0059.txt">View document source</a>. |
245 | Generated on: 2008-10-21 23:29 UTC. |
239 | Generated on: 2008-10-22 18:02 UTC. |
246 | Generated by <a class="reference external" href="http://docutils.sourceforge.net/">Docutils</a> from <a class="reference external" href="http://docutils.sourceforge.net/rst.html">reStructuredText</a> source. |
240 | Generated by <a class="reference external" href="http://docutils.sourceforge.net/">Docutils</a> from <a class="reference external" href="http://docutils.sourceforge.net/rst.html">reStructuredText</a> source. |
247 | |
241 | |
248 | </div> |
242 | </div> |
249 | </body> |
243 | </body> |
250 | </html> |
244 | </html> |