Changes between Version 44 and Version 45 of Bibliography


Ignore:
Timestamp:
2009-10-21T19:04:39Z (14 years ago)
Author:
zooko
Comment:

link to HKDF

Legend:

Unmodified
Added
Removed
Modified
  • Bibliography

    v44 v45  
    1313
    1414[http://defectoscopy.com/results.html defectoscopy.com] a table of semi-automated cryptanalysis results from the inventors of EnRUPT.  This technique has not been peer-reviewed by other cryptographers.  I (Zooko) can't judge how valid it is.  Note that MD4, MD5, SHA-0, SHA-1, SHA-2-256, and GOST are predicted to be insecure, while Tiger is predicted to be secure.  AES-128 is predicted to be insecure.  Salsa20 is predicted to be secure.
     15
     16[http://webee.technion.ac.il/~hugo/kdf/kdf.pdf HKDF full paper] defines and analyzes the ''HKDF'' Key-Derivation Algorithm; A KDF is a linchpin component of our crypto schemes.
    1517
    1618=== Elliptic Curve Cryptography ===