Hash functions

Results: 1148



#Item
121Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-03-01 16:01:06
122Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

Add to Reading List

Source URL: www5.rz.rub.de

Language: English - Date: 2012-07-23 07:34:30
    123.  . Security Reductions of Cryptographic Hash Functions .

    . . Security Reductions of Cryptographic Hash Functions .

    Add to Reading List

    Source URL: web.spms.ntu.edu.sg

    Language: English - Date: 2012-03-13 12:15:13
      124Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗  Elizabeth Thompson∗

      Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗

      Add to Reading List

      Source URL: www.stat.washington.edu

      Language: English - Date: 2010-03-17 13:23:00
      125Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

      Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-09-24 10:22:35
      126Introduction  MD New Results I

      Introduction MD New Results I

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2008-09-27 14:59:29
      127The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

      The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2007-03-29 16:18:56
      128Provable Security of Cryptographic Hash Functions  Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

      Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English - Date: 2012-08-24 06:11:58
        129How to Time-Stamp a Digital Document Stuart Haber  W. Scott Stornetta

        How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

        Add to Reading List

        Source URL: www.anf.es

        Language: English - Date: 2014-05-12 07:16:17
        130A SAT-based preimage analysis of reduced KECCAK hash functions August 5, 2010 Pawel Morawiecki1 and Marian Srebrny2 1

        A SAT-based preimage analysis of reduced KECCAK hash functions August 5, 2010 Pawel Morawiecki1 and Marian Srebrny2 1

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2010-10-19 10:06:41