Hash functions

Results: 1148



#Item
61Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their design

Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their design

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:39
    62Cryptanalysis of the ESSENCE Family of Hash Functions? Nicky Mouha1,2,?? , Gautham Sekar1,2,? ? ? , Jean-Philippe Aumasson3,† , Thomas Peyrin4 , Søren S. Thomsen5 , Meltem S¨onmez Turan6 , and Bart Preneel1,2 1  5

    Cryptanalysis of the ESSENCE Family of Hash Functions? Nicky Mouha1,2,?? , Gautham Sekar1,2,? ? ? , Jean-Philippe Aumasson3,† , Thomas Peyrin4 , Søren S. Thomsen5 , Meltem S¨onmez Turan6 , and Bart Preneel1,2 1 5

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:42
      63Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

      Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

      Add to Reading List

      Source URL: www.estv.admin.ch

      Language: English
      64Analysis of multivariate hash functions Jean-Philippe Aumasson, Willi Meier  3xy 2 + zt

      Analysis of multivariate hash functions Jean-Philippe Aumasson, Willi Meier 3xy 2 + zt

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:46:52
        65Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

        Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2015-02-03 09:25:05
        66Perfectly One-Way Probabilistic Hash Functions (Preliminary Version) Ran Canetti∗ Daniele Micciancio†

        Perfectly One-Way Probabilistic Hash Functions (Preliminary Version) Ran Canetti∗ Daniele Micciancio†

        Add to Reading List

        Source URL: omereingold.files.wordpress.com

        Language: English - Date: 2014-10-21 18:21:58
          67Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

          Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

          Add to Reading List

          Source URL: cseweb.ucsd.edu

          Language: English - Date: 2005-03-01 14:19:32
            68Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

            Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

            Add to Reading List

            Source URL: password-hashing.net

            Language: English - Date: 2014-10-16 08:19:35
            69Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

            Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

            Add to Reading List

            Source URL: password-hashing.net

            Language: English - Date: 2014-04-14 07:18:05