Cryptographic hash function

Results: 1121



#Item
11Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
12Cryptography / Cryptographic hash functions / Zero-knowledge proof / Function / Random oracle / Utility

Theory and Application of Extractable Functions A Dissertation Presented to the Faculty of the Graduate School of Yale University

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2009-07-02 20:00:57
13Mathematics / Search algorithms / Information retrieval / Information science / Hashing / Analysis of algorithms / Cryptographic hash functions / Computational complexity theory / Universal hashing / Hash function / Randomized algorithm / Subset sum problem

Space-Efficient Randomized Algorithms for K-SUM Joshua R. Wang Stanford University, Stanford CA 94305, USA

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2014-04-18 04:16:48
14Cryptography / Error detection and correction / Hash function / Radio-frequency identification / Cryptographic hash function

Proceedings - NN - Analysing the Molva and Di Pietro Private RFID Authentication Scheme

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:38:30
15Information retrieval / Hashing / Information science / Search algorithms / Universal hashing / Hash table / Hash function / Linear probing / Cuckoo hashing / Bloom filter / Cryptographic hash function / Randomness extractor

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream

Add to Reading List

Source URL: theoryofcomputing.org

Language: English - Date: 2014-11-14 13:01:16
16Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
17Cryptography / Public-key cryptography / Records management technology / Signature / Cryptographic hash functions / Error detection and correction / Hash function / Crypt / Electronic signature / Digital signature

eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
18Hashing / Information retrieval / Information science / Search algorithms / Hash table / Hash function / Quadratic probing / Cryptographic hash function / Linear probing / Trie / Double hashing / Hash list

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 15, 2011 Problem Set 2 Solutions

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-03-08 02:53:29
19Cryptography / Cryptographic hash functions / One-way compression function / Block cipher / SHA-1 / Hash function

An abridged version, reference [2], appears as Advances in Cryptology – CRYPTO ’02, Lecture Notes in Computer Science, Vol. ????, M. Yung, ed., Springer-Verlag. This is the full version. Black-Box Analysis of the Blo

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-06-04 14:04:18
20Wireless networking / Medicine / Cryptography / Health care / Body area network / Wireless sensor network / Sensor node / Biosensor / Wireless ad hoc network / Monitoring / Cryptographic hash function / Wireless network

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-26 01:10:03
UPDATE