Changes between Version 44 and Version 45 of Bibliography
- Timestamp:
- 2009-10-21T19:04:39Z (15 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Bibliography
v44 v45 13 13 14 14 [http://defectoscopy.com/results.html defectoscopy.com] a table of semi-automated cryptanalysis results from the inventors of EnRUPT. This technique has not been peer-reviewed by other cryptographers. I (Zooko) can't judge how valid it is. Note that MD4, MD5, SHA-0, SHA-1, SHA-2-256, and GOST are predicted to be insecure, while Tiger is predicted to be secure. AES-128 is predicted to be insecure. Salsa20 is predicted to be secure. 15 16 [http://webee.technion.ac.il/~hugo/kdf/kdf.pdf HKDF full paper] defines and analyzes the ''HKDF'' Key-Derivation Algorithm; A KDF is a linchpin component of our crypto schemes. 15 17 16 18 === Elliptic Curve Cryptography ===