Hash functions

Results: 1148



#Item
281Preimage attack / ICE / SHA-2 / SHA-1 / Hash function / VEST / Block cipher / Grøstl / Collision resistance / Cryptography / Error detection and correction / Cryptographic hash functions

SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 12:38:00
282Zero-knowledge proof / Cryptographic hash functions / Cryptography / Polish State Railways / IP

Analysis of some natural variants of the PKP Algorithm Rodolphe LAMPE and Jacques PATARIN PRISM - University of Versailles In 1989, Adi Shamir [15] proposed a new zero-knowledge identication scheme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-04 14:25:42
283Cryptographic protocols / Hashing / Password / Salt / Rainbow table / Hash table / Crypt / Random oracle / SHA-2 / Cryptography / Cryptographic hash functions / Search algorithms

Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda and David Pointcheval ENS, Paris, France ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-14 17:20:37
284SHA-2 / SHA-1 / NIST hash function competition / HMAC / Keccak / Skein / Crypt / Side channel attack / Computer security / Error detection and correction / Cryptographic hash functions / Cryptography

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-01 12:22:01
285Cyberwarfare / Applied mathematics / Security / Cryptographic hash functions / Advantage / SHA-2

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions Hidenori Kuwakado Masakatu Morii

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-07 20:24:31
286Cryptographic hash functions / Hash chain / Hash function / Password / S/KEY / Rainbow table / Hash table / Cryptography / Hashing / Search algorithms

Construction and Traversal of Hash Chain with Public Links Vipul Goyal OSP Global Mumbai, India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-26 16:46:21
287Search algorithms / Error detection and correction / Preimage attack / Ciphertext indistinguishability / Advantage / Random oracle / Hash function / Cryptography / Cryptographic hash functions / Hashing

Properties of Cryptographic Hash Functions Michal Rjaˇsko Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava. E-mail: Abstract. Thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 05:01:45
288Computational complexity theory / Preimage attack / Basketball at the 2009 Summer Universiade / Cryptographic hash functions

On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang1 , Mridul Nandi2 , and Moti Yung3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 07:46:56
289Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Crypt / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2008-01-11 06:10:48
290Block cipher / Hash function / Collision attack / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Error detection and correction

Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-24 08:27:19
UPDATE