Hash functions

Results: 1148



#Item
41Proceedings Template - WORD

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
42Microsoft Word - NLA-monographdoc

Microsoft Word - NLA-monographdoc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-06-14 11:43:50
43Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
44Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe  Christopher Collins

Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
45Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 10:37:36
46A Case Against Currently Used Hash Functions in RFID Protocols

A Case Against Currently Used Hash Functions in RFID Protocols

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-18 01:05:54
47Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
48Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-07-20 11:55:06
49The Migration of the Field Code Kellen Funk and Lincoln Mullen This paper describes our work in progress for the Digital Humanities Working Group at George Mason University on February 17, 2016. E-mail: lincoln@lincolnmu

The Migration of the Field Code Kellen Funk and Lincoln Mullen This paper describes our work in progress for the Digital Humanities Working Group at George Mason University on February 17, 2016. E-mail: lincoln@lincolnmu

Add to Reading List

Source URL: lmullen.github.io

Language: English - Date: 2016-08-13 18:01:55
50Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40