<--- Back to Details
First PageDocument Content
Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Error detection and correction / Hash function / Digital signature / Collision resistance / Hash / Trapdoor function / Security of cryptographic hash functions
Date: 2017-12-13 06:49:27
Cryptography
Hashing
Search algorithms
Cryptographic hash functions
Error detection and correction
Hash function
Digital signature
Collision resistance
Hash
Trapdoor function
Security of cryptographic hash functions

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 948,91 KB

Share Document on Facebook

Similar Documents

Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe  Christopher Collins

Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins

DocID: 1puqd - View Document

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper  1

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

DocID: 1ov5N - View Document

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

DocID: 1mCen - View Document

.  . Security Reductions of Cryptographic Hash Functions .

. . Security Reductions of Cryptographic Hash Functions .

DocID: 1lqtp - View Document

.  . Security Reductions of Cryptographic Hash Functions .

. . Security Reductions of Cryptographic Hash Functions .

DocID: 1kZbt - View Document