Timeline for linear cryptanalysis of hash function
Current License: CC BY-SA 3.0
7 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Apr 17, 2019 at 0:04 | history | bumped | CommunityBot | This question has answers that may be good or bad; the system has marked it active so that they can be reviewed. | |
| Mar 18, 2019 at 3:33 | comment | added | Squeamish Ossifrage | Many hash functions—like MD5, SHA-1, SHA-2—are built out of block ciphers with compositions like Davies–Meyer. | |
| Mar 17, 2019 at 23:28 | answer | added | kodlu | timeline score: 2 | |
| Feb 21, 2018 at 14:08 | history | edited | Geoffroy Couteau | CC BY-SA 3.0 | Spelling & grammar errors |
| Apr 21, 2017 at 3:23 | history | tweeted | twitter.com/StackCrypto/status/855260588297117697 | ||
| Apr 19, 2017 at 20:54 | review | First posts | |||
| Apr 19, 2017 at 22:13 | |||||
| Apr 19, 2017 at 20:50 | history | asked | user47315 | CC BY-SA 3.0 |