<--- Back to Details
First PageDocument Content
Hashing / Hash functions / Cryptography / Finite fields / Cyclic redundancy check / Cryptographic hash function / Hash table / String / Universal hashing / Error detection and correction / Search algorithms / Mathematics
Hashing
Hash functions
Cryptography
Finite fields
Cyclic redundancy check
Cryptographic hash function
Hash table
String
Universal hashing
Error detection and correction
Search algorithms
Mathematics

Add to Reading List

Source URL: ee380.stanford.edu

Download Document from Source Website

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

DocID: 1xTNj - View Document

Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

DocID: 1uAoQ - View Document

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

DocID: 1uyAd - View Document

Cryptography / Applied mathematics / Block cipher / Cryptographic hash function / Hash function / Cryptanalysis

Hash Functions Hash Functions Lecture 10 Hash Functions

DocID: 1uwvM - View Document

Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

DocID: 1tYRg - View Document