101![On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009 On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009](https://www.pdfsearch.io/img/d03cd8ad22925a36f4495304773fd912.jpg) | Add to Reading ListSource URL: digitalpiglet.orgLanguage: English - Date: 2009-11-27 08:30:51
|
---|
102![A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators](https://www.pdfsearch.io/img/a264c61c565fc304f31a46b3cfc1d4aa.jpg) | Add to Reading ListSource URL: www.findravi.comLanguage: English - Date: 2009-04-03 23:54:54
|
---|
103![Simple and Space-Efficient Minimal Perfect Hash Functions ⋆ Fabiano C. Botelho1 , Rasmus Pagh2 and Nivio Ziviani1 Simple and Space-Efficient Minimal Perfect Hash Functions ⋆ Fabiano C. Botelho1 , Rasmus Pagh2 and Nivio Ziviani1](https://www.pdfsearch.io/img/d9f81c69bdb9be5dfaed3d370b4e90ef.jpg) | Add to Reading ListSource URL: cmph.sourceforge.netLanguage: English - Date: 2012-03-21 00:30:01
|
---|
104![STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f](https://www.pdfsearch.io/img/65599fea107575be04d1748c18e97782.jpg) | Add to Reading ListSource URL: www.daemonology.netLanguage: English - Date: 2009-06-11 07:29:01
|
---|
105![Full Cryptanalysis of LPS and Morgenstern Hash Functions Christophe Petit1? , Kristin Lauter2 and Jean-Jacques Quisquater1?? 1 UCL Crypto Group? ? ? , 2 Microsoft Research. Full Cryptanalysis of LPS and Morgenstern Hash Functions Christophe Petit1? , Kristin Lauter2 and Jean-Jacques Quisquater1?? 1 UCL Crypto Group? ? ? , 2 Microsoft Research.](https://www.pdfsearch.io/img/95e3c092b3126f48ca6fc071fb387ff3.jpg) | Add to Reading ListSource URL: www.uclouvain.beLanguage: English - Date: 2011-12-14 05:30:36
|
---|
106![SHA-3 Conference, February 2009, Shabal SHA-3 Conference, February 2009, Shabal](https://www.pdfsearch.io/img/8eff19c751486034e4427e3cffbc576a.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-05 11:30:32
|
---|
107![SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions](https://www.pdfsearch.io/img/49d0c5fdffb1a2ba7e14344c4e0f5f8f.jpg) | Add to Reading ListSource URL: nvlpubs.nist.govLanguage: English - Date: 2015-08-04 11:34:10
|
---|
108![A Survey of Recent Cryptanalysis on Hash Functions Yu Sasaki NTT Corporation 30/AugASK 2011@NTU 1 A Survey of Recent Cryptanalysis on Hash Functions Yu Sasaki NTT Corporation 30/AugASK 2011@NTU 1](https://www.pdfsearch.io/img/b744d7ed4614a148f99c18ac63343ed6.jpg) | Add to Reading ListSource URL: web.spms.ntu.edu.sgLanguage: English - Date: 2012-03-13 12:15:13
|
---|
109![FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY](https://www.pdfsearch.io/img/68230ac4937ce50c37e95de96fe42d23.jpg) | Add to Reading ListSource URL: nvlpubs.nist.govLanguage: English - Date: 2015-08-04 11:33:21
|
---|
110![Characterizing Padding Rules of MD Hash Functions Preserving Collision Security Mridul Nandi National Institute of Standards and Technology Characterizing Padding Rules of MD Hash Functions Preserving Collision Security Mridul Nandi National Institute of Standards and Technology](https://www.pdfsearch.io/img/ce3c01f4e937295ddc3e7f418cce032b.jpg) | Add to Reading ListSource URL: www.isical.ac.inLanguage: English - Date: 2011-12-28 03:46:39
|
---|