Hash functions

Results: 1148



#Item
1Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
2

Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2016-09-29 20:50:51
    3

    How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

    Add to Reading List

    Source URL: merlot.usc.edu

    Language: English - Date: 2005-11-09 16:49:02
      4Cryptography / Applied mathematics / Block cipher / Cryptographic hash function / Hash function / Cryptanalysis

      Hash Functions Hash Functions Lecture 10 Hash Functions

      Add to Reading List

      Source URL: courses.engr.illinois.edu

      Language: English - Date: 2016-02-25 12:47:48
      5

      Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2016-09-29 20:50:51
        6

        Implementation and Benchmarking of Perceptual Image Hash Functions Christoph Zauner DIPLOMARBEIT

        Add to Reading List

        Source URL: www.phash.org

        Language: English - Date: 2010-07-20 12:14:14
          7

          Comments Received in Response to: Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

          Add to Reading List

          Source URL: csrc.nist.gov

          - Date: 2017-02-24 15:05:30
            8

            (ARCHIVED as of AUGUST 5, 2015): DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

            Add to Reading List

            Source URL: csrc.nist.gov

            - Date: 2017-03-01 15:35:52
              9

              New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity Muhammad Barham1,? , Orr Dunkelman1,? , Stefan Lucks2 , and Marc Stevens3 1

              Add to Reading List

              Source URL: marc-stevens.nl

              - Date: 2017-08-13 07:48:58
                10

                Stellingen bij het proefschrift Attacks on Hash Functions and Applications door Marc Stevens

                Add to Reading List

                Source URL: marc-stevens.nl

                - Date: 2017-08-13 07:48:58
                  UPDATE