|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
02-07-2018, 21:36 | #1 (permalink) |
Junior Member Join Date: Feb 2018
Posts: 3
Member: 2808806 Status: Offline Thanks Meter: 0 | Comp128 help I am not sure if this the right place for a post like this so I hope if not you keep it till a satisfying answer is reached My assignment in university is about some old hash and compression functions, my choice was comp128v1 I understood it completely and understood 2R pipe attack (cuz this is my portion of the assignment ) What makes me sad is that I don't understand the 3R , 4R and 5R attacks ! Unfortunately, all resources are old ( back to 2004 at most) and many of them were deleted. even source codes are also not found ( I mean simscan by Dejan) The only document I reached is one made by SirGraham and dejan back to 2004 (named COMP 128-R3) which I got much pain and didn't understand it Can any one help me? I hope some one give me a well-documented code/ comment..etc on how it works from A to Z. Regards. |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|