Content deleted Content added
Tsihonglau (talk | contribs) |
Tsihonglau (talk | contribs) |
||
Line 267:
! [[Preimage attack|Second<br />preimage]]
! [[Preimage attack|Preimage]]
|-
| [[MD2]]
| 128
| 864
|
|
| [http://eprint.iacr.org/2008/089.pdf 2<sup>73</sup>]
|-
| [[MD4]]
Line 278 ⟶ 285:
| 128
| 64
| [http://eprint.iacr.org/
|
| [http://www.springerlink.com/content/q1033484h6t2rj18/ 2<sup>96</sup>:44]
|-
| [[SHA-0]]
| 160
| 80
| [http://www.springerlink.com/content/3810jp9730369045/ 2<sup>33.6</sup>]
|
|
|-
| [[SHA-1]]
| 160
| 80
| [http://eprint.iacr.org/2008/469.pdf 2<sup>51</sup>]
|
|
|-
| [[SHA-256]]<br />[[SHA-224]]
| 256<br />224
| 64
| [http://eprint.iacr.org/2008/270.pdf 2<sup>28.5</sup>:24]
|
|
|-
| [[SHA-512]]<br />[[SHA-384]]
| 512<br />384
| 80
| [http://eprint.iacr.org/2008/270.pdf 2<sup>32.5</sup>:24]
|
|
|}
=== Notes ===
|