add note about AES-128 and Salsa20 on defectoscopy.com
[Imported from Trac: page Bibliography, version 40]
parent
a66c722f17
commit
bf6f42e333
|
@ -15,7 +15,7 @@ Here are some papers that are potentially of interest.
|
||||||
|
|
||||||
[Cryptanalysis of the Tiger Hash Function](https://online.tu-graz.ac.at/tug_online/voe_main2.getvolltext?pDocumentNr=81263) by Mendel and RIjmen
|
[Cryptanalysis of the Tiger Hash Function](https://online.tu-graz.ac.at/tug_online/voe_main2.getvolltext?pDocumentNr=81263) by Mendel and RIjmen
|
||||||
|
|
||||||
[defectoscopy.com](http://defectoscopy.com/results.html) a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique has not been peer-reviewed by other cryptographers. I (Zooko) can't judge how valid it is. Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool. MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure.
|
[defectoscopy.com](http://defectoscopy.com/results.html) a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique has not been peer-reviewed by other cryptographers. I (Zooko) can't judge how valid it is. Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool. MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure. AES-128 is predicted to be insecure. Salsa20 is predicted to be secure.
|
||||||
|
|
||||||
### Elliptic Curve Cryptography
|
### Elliptic Curve Cryptography
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue