Cryptographic hash function

Results: 1121



#Item
991VEST / Pseudorandom number generators / Block cipher modes of operation / Q / E0 / S-box / Linear feedback shift register / Grain / T-function / Cryptography / Stream ciphers / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-04-08 09:55:43
992Cryptography / Cryptographic hash functions / Search algorithms / UMAC / Cryptographic nonce / HMAC / Hash function / Universal hashing / SHA-1 / Message authentication codes / Hashing / Error detection and correction

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2001-09-27 19:15:27
993Search algorithms / Preimage attack / Error detection and correction / Universal one-way hash function / Collision resistance / SHA-1 / Hash function / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-12 14:18:41
994Information science / Artificial intelligence / Hash function / Hash table / Cuckoo hashing / Perfect hash function / Cryptographic hash function / Hash join / Hash list / Hashing / Search algorithms / Information retrieval

PDF Document

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-06-18 19:40:32
995Digital signature / RSA / MD5 / Diffie–Hellman key exchange / ElGamal encryption / Hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Cryptographic hash function

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2002-05-08 21:58:28
996Search algorithms / SWIFFT / Merkle–Damgård construction / Applied mathematics / Hash function / One-way function / Computing / Cyberwarfare / GOST / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2008-10-30 09:32:13
997SHA-1 / SHA-2 / Advanced Encryption Standard / Differential cryptanalysis / Grøstl / Whirlpool / MD5 / Hash function / MD4 / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www2.mat.dtu.dk

Language: English - Date: 2009-04-16 05:24:05
998Information retrieval / Searching / Web crawlers / World Wide Web / Consistent hashing / Robots exclusion standard / Hash function / Hash table / Cryptographic hash function / Hashing / Information science / Search algorithms

PDF Document

Add to Reading List

Source URL: vigna.dsi.unimi.it

Language: English - Date: 2003-10-19 11:16:51
999NIST hash function competition / One-way compression function / Advanced Encryption Standard / Block cipher / Padding / GOST / Grøstl / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2008-10-24 02:19:12
1000Error detection and correction / Security / Information / Search algorithms / Fingerprint / Identifiers / Hash function / Public key fingerprint / Rabin–Karp algorithm / Hashing / Cryptography / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-03-27 18:35:00
UPDATE