Back to Results
First PageMeta Content
Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography


Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski [removed] Faculty of Information Technology, Mathematics and Electrical Engin
Add to Reading List

Document Date: 2010-12-04 13:55:47


Open Document

File Size: 505,58 KB

Share Result on Facebook

City

HAIFA / /

Company

Zoran / /

Country

United States / /

Currency

pence / /

/

Facility

Texas A&M University / Electrical Engineering Institute of Telematics Norwegian University / /

IndustryTerm

concrete protocols / cryptographic algorithms / /

Organization

Information Technology / Mathematics and Electrical Engineering Institute / Department of Mathematics / Texas A&M University / Faculty of Information Technology / Telematics Norwegian University of Science and Technology Trondheim / /

Person

Ernst Schulte-Geers / Danilo Gligoroski Danilo / /

/

Position

Consultant / /

Product

ipad / /

Technology

cryptography / secret key / operating system / SSL / Information Technology / /

SocialTag