Changes between Version 43 and Version 44 of Bibliography


Ignore:
Timestamp:
2009-10-07T17:53:00Z (15 years ago)
Author:
zooko
Comment:

update summary of defectoscopy

Legend:

Unmodified
Added
Removed
Modified
  • Bibliography

    v43 v44  
    1212[http://www.ecrypt.eu.org/stream The European Stream Cipher project] which evaluated many stream ciphers including Salsa20
    1313
    14 [http://defectoscopy.com/results.html defectoscopy.com] a table of semi-automated cryptanalysis results from the inventors of EnRUPT.  This technique has not been peer-reviewed by other cryptographers.  I (Zooko) can't judge how valid it is.  Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool.  MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure.  AES-128 is predicted to be insecure.  Salsa20 is predicted to be secure.
     14[http://defectoscopy.com/results.html defectoscopy.com] a table of semi-automated cryptanalysis results from the inventors of EnRUPT.  This technique has not been peer-reviewed by other cryptographers.  I (Zooko) can't judge how valid it is.  Note that MD4, MD5, SHA-0, SHA-1, SHA-2-256, and GOST are predicted to be insecure, while Tiger is predicted to be secure.  AES-128 is predicted to be insecure.  Salsa20 is predicted to be secure.
    1515
    1616=== Elliptic Curve Cryptography ===