Hash functions

Results: 1148



#Item
11Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

Add to Reading List

Source URL: liu.diva-portal.org

- Date: 2013-04-18 05:30:18
    12Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions

    Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions

    Add to Reading List

    Source URL: liu.diva-portal.org

    - Date: 2010-06-16 03:36:14
      13Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman August 26, 2009 Abstract This paper presents an attack on the strong collision resistance of the Spectral Hash SHA-3 candidate.

      Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman August 26, 2009 Abstract This paper presents an attack on the strong collision resistance of the Spectral Hash SHA-3 candidate.

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2009-08-26 12:02:39
        14Implementing Smooth Projective Hash Functions Advisor(s): David Derler, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

        Implementing Smooth Projective Hash Functions Advisor(s): David Derler, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

        Add to Reading List

        Source URL: www.iaik.tugraz.at

        - Date: 2015-09-08 06:00:03
          15GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

          GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

          Add to Reading List

          Source URL: www.cryptophone.de

          Language: English - Date: 2009-10-21 09:08:30
          16The Politics of Cryptography: Bitcoin and The Ordering Machines

          The Politics of Cryptography: Bitcoin and The Ordering Machines

          Add to Reading List

          Source URL: iqdupont.com

          Language: English - Date: 2015-12-03 10:50:31
          17Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

          Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

          Add to Reading List

          Source URL: www-tcs.cs.uni-sb.de

          Language: English - Date: 2016-03-06 16:06:05
          18Real-Time Community Detection in Large Social Networks on a Laptop Ben Chamberlain Clive Humby

          Real-Time Community Detection in Large Social Networks on a Laptop Ben Chamberlain Clive Humby

          Add to Reading List

          Source URL: www.mlgworkshop.org

          Language: English - Date: 2016-08-14 01:22:56
          19The Politics of Cryptography: Bitcoin and The Ordering Machines

          The Politics of Cryptography: Bitcoin and The Ordering Machines

          Add to Reading List

          Source URL: www.iqdupont.com

          Language: English - Date: 2015-12-03 10:50:31