Timeline for Using weak hash functions to construct a stream cipher
Current License: CC BY-SA 4.0
5 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| May 24, 2018 at 21:28 | history | edited | Squeamish Ossifrage | CC BY-SA 4.0 | Be clearer about limits and rationale for limits. |
| May 12, 2018 at 1:30 | vote | accept | forest | ||
| Apr 23, 2018 at 21:01 | history | edited | Squeamish Ossifrage | CC BY-SA 3.0 | Emphasize that the encoding of the key, nonce, and block counter must be fixed-length. This is already stated later, but perhaps not as clearly as it should have been. |
| Apr 22, 2018 at 15:55 | history | edited | Squeamish Ossifrage | CC BY-SA 3.0 | Suggest HMAC-MD5 for authentication. Caution about multi-target attacks. |
| Apr 21, 2018 at 15:26 | history | answered | Squeamish Ossifrage | CC BY-SA 3.0 |