AR

From The ECRYPT Hash Function Website
Jump to:navigation, search

Contents

  • 1 Specification
  • 2 Cryptanalysis
    • 2.1 Best Known Results
    • 2.2 Generic Attacks
    • 2.3 Collision Attacks
    • 2.4 Second Preimage Attacks
    • 2.5 Preimage Attacks
    • 2.6 Others

1 Specification

ISO N179 - AR Fingerprint Function

,1992
Bibtex
Author : ISO N179
Title : AR Fingerprint Function
In : -
Address :
Date : 1992

2 Cryptanalysis

2.1 Best Known Results


2.2 Generic Attacks

  • Generic Attacks on the Merkle-Damgaard Construction

2.3 Collision Attacks

Ivan Damg\aard, Lars R. Knudsen - The Breaking of the AR Hash Function

EUROCRYPT pp. 286-292,1993
http://link.springer.de/link/service/series/0558/bibs/0765/07650286.htm
Bibtex
Author : Ivan Damg\aard, Lars R. Knudsen
Title : The Breaking of the AR Hash Function
In : EUROCRYPT -
Address :
Date : 1993

2.4 Second Preimage Attacks

Ivan Damg\aard, Lars R. Knudsen - The Breaking of the AR Hash Function

EUROCRYPT pp. 286-292,1993
http://link.springer.de/link/service/series/0558/bibs/0765/07650286.htm
Bibtex
Author : Ivan Damg\aard, Lars R. Knudsen
Title : The Breaking of the AR Hash Function
In : EUROCRYPT -
Address :
Date : 1993

2.5 Preimage Attacks


2.6 Others

Retrieved from "https://ehash.iaik.tugraz.at/index.php?title=AR&oldid=1901"

Navigation menu

Views

  • Page
  • Discussion
  • View source
  • History

Personal tools

  • Log in

Navigation

  • The eHash Main Page
  • Hash Function Zoo
  • SHA-3 Zoo
  • Recent changes
  • Random page
  • Help

 

Tools

  • What links here
  • Related changes
  • Special pages
  • Printable version
  • Permanent link
  • Page information
Powered by MediaWiki
  • This page was last edited on 11 March 2008, at 12:44.
  • Privacy policy
  • About The ECRYPT Hash Function Website
  • Disclaimers