Cryptographic hash functions

Results: 1068



#Item
71Cryptographic hash functions / NIST hash function competition / SHA-3

SHA-3 Conference, February 2009, Shabal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-05 11:30:32
72Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:34:10
73Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:33:21
74

. . Security Reductions of Cryptographic Hash Functions .

Add to Reading List

Source URL: www1.spms.ntu.edu.sg

Language: English - Date: 2011-08-31 02:03:42
    75Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

    Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-09-27 14:59:29
    76Information retrieval / Hashing / Error detection and correction / Information science / Computer programming / Cryptographic hash functions / Search algorithms / Distributed data storage / Bloom filter / Hash function / Hash list / Trie

    Data Discovery and Dissemination with DIP tinyos-2.x/tos/lib/net/dip Kaisen Lin UC San Diego

    Add to Reading List

    Source URL: sing.stanford.edu

    Language: English - Date: 2014-11-10 18:30:10
    77Cryptography / Hashing / Error detection and correction / Cryptographic hash functions / Search algorithms / Commitment scheme / Hash function / Coin flipping / RSA / Crypt

    Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2014-03-01 16:01:06
    78

    . . Security Reductions of Cryptographic Hash Functions .

    Add to Reading List

    Source URL: web.spms.ntu.edu.sg

    Language: English - Date: 2012-03-13 12:15:13
      79Information retrieval / Hashing / Information science / Search algorithms / Error detection and correction / Cryptography / Cryptographic hash functions / Arrays / Hash table / Hash function / Hash list / Hash

      Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗

      Add to Reading List

      Source URL: www.stat.washington.edu

      Language: English - Date: 2010-03-17 13:23:00
      80Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

      Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-09-24 10:22:35
      UPDATE