1![Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep](https://www.pdfsearch.io/img/24f2e8a015c864fc31222559e0cd2132.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2008-09-27 14:59:29
|
---|
2![Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion](https://www.pdfsearch.io/img/78c50496f8107cff4dbf9de972ab8160.jpg) | Add to Reading ListSource URL: www5.rz.rub.deLanguage: English - Date: 2012-07-23 07:34:30
|
---|
3![](https://www.pdfsearch.io/img/0f0b78bc0d8e603a2205297bd9d2c0f5.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-21 04:05:40
|
---|
4![Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash](https://www.pdfsearch.io/img/d8b5279b72d14e1f73306b421c896818.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-12-31 14:07:22
|
---|
5![An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing: An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:](https://www.pdfsearch.io/img/3de78805a464d5d2e97246ae85e92c9a.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 1998-07-30 12:00:14
|
---|
6![CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003. CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.](https://www.pdfsearch.io/img/8d92584140be5dc0763eae1ddd02882d.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2003-02-14 22:08:35
|
---|
7![X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN <joan.daemen@st.com> To: <hash-function@nist.gov> X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN <joan.daemen@st.com> To: <hash-function@nist.gov>](https://www.pdfsearch.io/img/bb62a8106ae8b99c1c08995106fb4c24.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 09:10:52
|
---|
8![](https://www.pdfsearch.io/img/f883f98d1863505948209da572c3c34d.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-07 14:18:38
|
---|
9![](https://www.pdfsearch.io/img/e32a7acf6f23640222b1beb4b2d35c7b.jpg) | Add to Reading ListSource URL: ehash.iaik.tugraz.atLanguage: English - Date: 2008-12-11 07:01:14
|
---|
10![](https://www.pdfsearch.io/img/e48c701aec038e7165665e07b7736260.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-04-19 10:02:27
|
---|