Hash functions

Results: 1148



#Item
231More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
232An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School of Computer Science University of Waterloo, Waterloo, ON, Canada {j32wu, dstinson}@uwate

An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School of Computer Science University of Waterloo, Waterloo, ON, Canada {j32wu, dstinson}@uwate

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-15 09:30:41
233F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China

F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-20 23:47:47
234Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-10 11:39:44
235Perl versiondocumentation - Digest::file  NAME Digest::file - Calculate digests of files  SYNOPSIS

Perl versiondocumentation - Digest::file NAME Digest::file - Calculate digests of files SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:24:19
236Bouncy Castle FIPS Java API  1 MayIntroduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Bouncy Castle FIPS Java API 1 MayIntroduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-05-08 17:24:41
237iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
238COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.

COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:42
239Release Notes - Version

Release Notes - Version

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2014-11-17 16:33:02
240IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet   ABSTRACT

IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet ABSTRACT

Add to Reading List

Source URL: static.benet.ai

Language: English - Date: 2014-07-24 07:13:01