Elliptic function

Results: 206



#Item
201Cryptography / SHA-2 / SANDstorm hash / SHA-1 / MD6 / NaSHA / Keccak / Elliptic curve only hash / Collision attack / Error detection and correction / Cryptographic hash functions / NIST hash function competition

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:18:38
202Cryptography / SHA-1 / SHA-2 / NaSHA / SANDstorm hash / Elliptic curve only hash / Keccak / Collision attack / Preimage attack / Error detection and correction / NIST hash function competition / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-19 10:02:27
203Geometry / Error detection and correction / Elliptic curve / Topology / Preimage attack / Hash function / Curve / Cryptographic hash functions / Mathematics / Elliptic curve only hash

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-10 16:39:37
204Digital signature / Data Encryption Standard / Federal Information Processing Standard / FIPS 140-2 / RSA / Non-repudiation / Cryptographic hash function / Elliptic Curve DSA / Cryptography standards / Cryptography / Public-key cryptography / Digital Signature Algorithm

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-12 13:59:11
205Search algorithms / Preimage attack / Hash function / MD5 / SHA-1 / Collision / One-way compression function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-20 11:28:06
206Preimage attack / Elliptic curve / Hash function / Cryptography / Cryptographic hash functions / Elliptic curve only hash

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:44:22
UPDATE