Collision attack

Results: 186



#Item
61Cryptographic hashing  Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Cryptographic hashing Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-14 14:59:32
62Analysis of Step-Reduced SHA-256

Analysis of Step-Reduced SHA-256

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-19 06:40:58
63FSE[removed]17, Graz)  Some Plausible Constructions of Double-Block-Length Hash Functions  Shoichi Hirose

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
64Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb

Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb

Add to Reading List

Source URL: www.jucs.org

Language: English - Date: 2008-09-17 07:43:00
65Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
66Microsoft Word - fatalities_web.doc

Microsoft Word - fatalities_web.doc

Add to Reading List

Source URL: aem.cornell.edu

Language: English - Date: 2013-06-17 13:47:30
67Microsoft Word - Scott Contini.doc

Microsoft Word - Scott Contini.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:08:36
68APPENDIX F INCIDENT ACTION PLAN RESPONSE OBJECTIVES and STRATEGIES *

APPENDIX F INCIDENT ACTION PLAN RESPONSE OBJECTIVES and STRATEGIES *

Add to Reading List

Source URL: www.cpf.navy.mil

Language: English - Date: 2011-01-28 14:44:13
69Cryptography Research and Evaluation Committees

Cryptography Research and Evaluation Committees

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:12
70X-Sieve: CMU Sieve 2.2 From: To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo" title="X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo" class="img-responsive img-polaroid">

X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:02:04