Hash functions

Results: 1148



#Item
321Stream ciphers / Cryptographic hash functions / Advanced Encryption Standard / Hamming weight / Py / Lookup table / Cryptography / Keccak / NIST hash function competition

Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 21:07:24
322Hashing / NIST hash function competition / Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / Grøstl / VEST / Whirlpool / Cryptography / Cryptographic hash functions / GOST standards

STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 15:45:44
323Cryptographic hash functions / Electronic commerce / Certificate policy / SHA-1 / SHA-2 / Digital signature / Public key certificate / Digital Signature Algorithm / SHA / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - APTFF_KTNET_2011_Jay Kim.ppt [호환 모드]

Add to Reading List

Source URL: unnext.unescap.org

Language: English
324MD4 / MD5 / RIPEMD / Hans Dobbertin / HAVAL / SHA-1 / Comparison of cryptographic hash functions / Hash function / Collision / Cryptography / Cryptographic hash functions / Hashing

Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang1, Dengguo Feng2, Xuejia Lai3, Hongbo Yu1

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2004-08-18 20:15:31
325Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
326Search algorithms / Error detection and correction / MD5 / Collision resistance / Hash function / SHA-1 / Birthday attack / Collision / Quadratic probing / Cryptographic hash functions / Cryptography / Hashing

Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:24:55
327Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 12:00:14
328Cyberwarfare / Computer security / Rainbow table / Password / SHA-2 / Crypt / Hash function / Password strength / Salt / Cryptography / Cryptographic hash functions / Search algorithms

CIS 331 Introduction to Networks & Security February 10, 2015 Homework 3: Passwords

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-10 00:30:21
329Spam filtering / Computer security / Hash function / Computing / Cyberwarfare / Proof-of-work system / Search algorithms / Email authentication / Hashcash

Hashcash - Amortizable Publicly Auditable Cost-Functions Adam Back e-mail: 1st August 2002 Abstract We present a distributed efficiently amortizable CPU cost-function with no trap–door. The absence

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:55
330Elliptic curve cryptography / BasicCard / Digital signature / IEEE P1363 / SHA-1 / Crypt / Integrated Encryption Scheme / Elliptic Curve DSA / Cryptography / Public-key cryptography / Cryptographic hash functions

Elliptic Curves in the BasicCard Tony Guilfoyle ZeitControl cardsystems GmbH e-mail: 14th February 2000

Add to Reading List

Source URL: www.basiccard.com

Language: English - Date: 2000-02-16 08:07:52
UPDATE