121![Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University](https://www.pdfsearch.io/img/418e7c5ae25b7734cedc9bf92ce1661a.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2014-03-01 16:01:06
|
---|
122![Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion](https://www.pdfsearch.io/img/78c50496f8107cff4dbf9de972ab8160.jpg) | Add to Reading ListSource URL: www5.rz.rub.deLanguage: English - Date: 2012-07-23 07:34:30
|
---|
123![. . Security Reductions of Cryptographic Hash Functions . . . Security Reductions of Cryptographic Hash Functions .](https://www.pdfsearch.io/img/b2a89ad81adde005c18b86c309a86d01.jpg) | Add to Reading ListSource URL: web.spms.ntu.edu.sgLanguage: English - Date: 2012-03-13 12:15:13
|
---|
124![Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗ Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗](https://www.pdfsearch.io/img/630b730f0764b7d5ac6f3de9b175892e.jpg) | Add to Reading ListSource URL: www.stat.washington.eduLanguage: English - Date: 2010-03-17 13:23:00
|
---|
125![Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection](https://www.pdfsearch.io/img/89f69c1321f06af1244e518800413a70.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2015-09-24 10:22:35
|
---|
126![Introduction MD New Results I Introduction MD New Results I](https://www.pdfsearch.io/img/6e47612451454cc2c554df135718885e.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2008-09-27 14:59:29
|
---|
127![The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner](https://www.pdfsearch.io/img/a028d108a104cc9f2386c51f836b1f00.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2007-03-29 16:18:56
|
---|
128![Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia](https://www.pdfsearch.io/img/4d5c48f512f267c00cb9d2b2ed75f7a5.jpg) | Add to Reading ListSource URL: web.spms.ntu.edu.sgLanguage: English - Date: 2012-08-24 06:11:58
|
---|
129![How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta](https://www.pdfsearch.io/img/6543e8126df128b796fb46333fd7616c.jpg) | Add to Reading ListSource URL: www.anf.esLanguage: English - Date: 2014-05-12 07:16:17
|
---|
130![A SAT-based preimage analysis of reduced KECCAK hash functions August 5, 2010 Pawel Morawiecki1 and Marian Srebrny2 1 A SAT-based preimage analysis of reduced KECCAK hash functions August 5, 2010 Pawel Morawiecki1 and Marian Srebrny2 1](https://www.pdfsearch.io/img/89438a4b0599dce59e61071e63196057.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-10-19 10:06:41
|
---|