Hash functions

Results: 1148



#Item
241Cryptographic hash functions / Hashing / Internet standards / Email / MD5 / Crypt / SHA-2 / MD4 / HMAC / Error detection and correction / Computing / Cryptography

Perl versiondocumentation - Digest NAME Digest - Modules that calculate message digests SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:56:11
242Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 17:02:16
243Hash table / Hash list / Information retrieval / Artificial intelligence / Information science / Cryptographic hash functions / Hashing / Error detection and correction

Overview of NFD Beichuan Zhang The University Of Arizona What is NFD

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:48:25
244Hashing / Cryptographic software / Advanced Encryption Standard / HMAC / SHA-2 / SHA-1 / FIPS 140-2 / FIPS 140 / Key size / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - SamsungCryptoAPI_SPv1.12

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 09:56:13
245Computer security / MD5 / Cryptographic hash functions / Search algorithms / Archive formats / Crypt / GNU Privacy Guard / Zip / MD4 / Cryptography / Computing / Hashing

Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2004-12-02 07:12:00
246Computing / Cryptography / Computer programming / B-tree / Search algorithms / Hash function / Bloom filter / MD5 / Binary tree / Hashing / Cryptographic hash functions / Error detection and correction

FastAD: An Authenticated Directory for Billions of Objects Paul T. Stanton, Benjamin McKeown, Randal Burns, Giuseppe Ateniese Department of Computer Science, Johns Hopkins University ABSTRACT We develop techniques that m

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-09-28 22:39:23
247Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
248Random oracle / Preimage attack / Hash function / MDC-2 / Merkle–Damgård construction / SHA-1 / Oracle machine / SHA-2 / Advantage / Cryptography / Cryptographic hash functions / One-way compression function

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52
249Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45
250Randomness / Pseudorandomness / Information theory / Computational complexity theory / Pseudorandom number generators / Pseudorandom generator / Leftover hash lemma / Entropy / Fortuna / Theoretical computer science / Applied mathematics / Cryptography

Efficiency Improvements in Constructing Pseudorandom Generators from One-way Functions∗ Iftach Haitner† and Omer Reingold‡ and Salil Vadhan§ May 24, 2012 Abstract

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2013-11-27 11:40:21
UPDATE