First Page | Document Content | |
---|---|---|
Date: 2017-12-13 06:49:27Cryptography Hashing Search algorithms Cryptographic hash functions Error detection and correction Hash function Digital signature Collision resistance Hash Trapdoor function Security of cryptographic hash functions | This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 948,91 KBShare Document on Facebook |
Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher CollinsDocID: 1puqd - View Document | |
Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1DocID: 1ov5N - View Document | |
PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago TorresDocID: 1mCen - View Document | |
. . Security Reductions of Cryptographic Hash Functions .DocID: 1lqtp - View Document | |
. . Security Reductions of Cryptographic Hash Functions .DocID: 1kZbt - View Document |