Hash functions

Results: 1148



#Item
271Software / Bitcoin / Peer-to-peer computing / Financial cryptography / Proof-of-work system / Public-key cryptography / Peer-to-peer / Electronic money / Cryptographic nonce / Cryptography / Computing / Cryptographic hash functions

Permacoin: Repurposing Bitcoin Work for Data Preservation Andrew Miller1 , Ari Juels2 , Elaine Shi1 , Bryan Parno3 and Jonathan Katz1 1 University of Maryland Cornell Tech (Jacobs)

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-06-04 21:57:05
272Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
273Hashing / Cryptographic hash functions / Trusted third party / Hash list / Hash function / Digital signature / RSA / Cryptography / Public-key cryptography / Error detection and correction

Microsoft PowerPoint - 05-Contract-Signing Protocols.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-05 04:11:06
274Trigram / Font family / Cryptographic hash functions / Typography / The quick brown fox jumps over the lazy dog

Service: "At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, simili

Add to Reading List

Source URL: forums.planetpdf.com

Language: English - Date: 2015-02-23 12:40:45
275Hashing / Error detection and correction / Hash function / Preimage attack / MD5 / Advantage / Oracle machine / Random oracle / Quadratic probing / Cryptography / Cryptographic hash functions / Search algorithms

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
276Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-06-15 18:30:25
277Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
278Padding / Collision attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2

Semi-free start collision attack on Blender

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 20:38:01
279Civil law / Digital signature / Key management / Notary / RSA / Model theory / Structure / Permutation / Mathematics / Public-key cryptography / Cryptography

An extended abstract of this work appeared in the proceedings of PKCThis is the full version. Tightly-Secure Signatures from Chameleon Hash Functions Olivier Blazy1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-22 09:39:13
280Mihir Bellare

HASH FUNCTIONS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-29 15:51:13
    UPDATE