Cryptographic hash function

Results: 1121



#Item
21Computing / Java platform / Kerberos / Transport Layer Security / Java Development Kit / Java security / Oracle Corporation / OpenJDK / Cryptographic hash function / Oracle Database / Java / Generic Security Services Application Program Interface

1 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Using the New JDK 8 Security Features

Add to Reading List

Source URL: blogs.oracle.com

Language: English - Date: 2013-09-25 13:14:11
22Cryptography / Biometrics / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
23Cryptography / Cryptographic hash functions / Information retrieval / Search algorithms / Hashing / Permutations / Error detection and correction / Hash function / Advantage / Birthday attack / Parity of a permutation / One-way compression function

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-05-26 20:18:15
24Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
25Information retrieval / Information science / Search algorithms / Hashing / Extendible hashing / Hash table / Linear hashing / Hash function / Hash / Double hashing / Cryptographic hash function / Partition

Hybrid Use of Hashing Techniques for Spatial Data Wayne A. Davis Department of Computing Science The University of Alberta Edmonton, Alberta, Canada T6G 2H1

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 01:13:26
26Cryptography / Cryptographic hash functions / Public-key cryptography / Error detection and correction / Hash function / Digital signature / Parameter / SECG / SHA-2

Elliptic Curve Abe-Okamoto-Suzuki Message Recovery Signature Scheme (ECAOS) Working DraftAugust 25,

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
27Cryptography / Post-quantum cryptography / Lattice-based cryptography / Public-key cryptography / Key management / Homomorphic encryption / NTRU / Lattice problem / SWIFFT / Cryptographic hash function / Key / Lattice

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Add to Reading List

Source URL: thmatters.files.wordpress.com

Language: English - Date: 2015-09-29 10:45:40
28Cryptography / Applied mathematics / Block cipher / Cryptographic hash function / Symmetric-key algorithm / Cryptanalysis / Public-key cryptography / Stream cipher / Cipher / Hash function / Tiny Encryption Algorithm / Index of cryptography articles

An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-29 16:43:02
29Cryptography / NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Joan Daemen / Gilles Van Assche / Differential cryptanalysis / Data Encryption Standard

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
30Software / Java enterprise platform / Apache Tomcat / Cryptographic hash function / Tomcat / Cryptography / Computing

A NEW PLATFORM FOR A NEW ERA Apache Tomcat and SSL Mark Thomas, Staff Engineer, Pivotal

Add to Reading List

Source URL: home.apache.org

Language: English - Date: 2015-03-01 12:30:36
UPDATE