SHA

Results: 7306



#Item
851Hashing / Computing / Search algorithms / MD5 / HMAC / Crypt / Collision attack / SHA-1 / Md5sum / Error detection and correction / Cryptography / Cryptographic hash functions

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
852Cheung Sha Wan / Sham Shui Po / The Hong Kong Council of the Church of Christ in China / Ying Wa Primary School / PTT Bulletin Board System / Hong Kong / Provinces of the People\'s Republic of China / Liwan District

Our School Song The current St. Stephen’s College Song was first introduced in the 1970’s, the same decade when the College turned from a private school into a Government aided school. Prior to that, from 1903, a hy

Add to Reading List

Source URL: www.sscaa.org

Language: English - Date: 2012-06-21 06:59:02
853Education / Wan Chai / Sha Tin / Kwai Chung / Shatin Tsung Tsin Secondary School / Sacred Heart Canossian College / Hong Kong / Curriculum / Didactics

Microsoft Word - Consolidated CM_Distribution_Oct13_Eng

Add to Reading List

Source URL: www.edb.gov.hk

Language: English - Date: 2013-12-23 02:59:40
854Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
855Obfuscated code / Latin alphabets / C programming language / International Obfuscated C Code Contest

Connecting With Your Source STREET SMARTS For Challenging Times Sha ron Sl ockbowe r

Add to Reading List

Source URL: www.balboapress.com

Language: English - Date: 2012-01-19 10:03:08
856Hashing / Cryptographic hash functions / Block cipher / HMAC / CMAC / MD5 / Padding / SHA-1 / CBC-MAC / Cryptography / Message authentication codes / Error detection and correction

An extended abstract of this paper appears in Advances in Cryptology { Crypto 99 Proceedings, Lecture Notes in Computer Science Vol. ??, M. Wiener ed., Springer-Verlag, 1999. This is the full paper. Constructing VIL-MACs

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1999-06-15 18:30:25
857Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
858Padding / Collision attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2

Semi-free start collision attack on Blender

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 20:38:01
859South China Sea / Geography of China / Political geography / Education in Hong Kong / Hong Kong / Pearl River Delta

Internet Professional Association Rm 623, 6/F., KwongLoongTaiBuilding, Tai Nan West Street, Cheung Sha Wan, Kowloon, Hong Kong Tel: ( Fax: (

Add to Reading List

Source URL: iproa.org

Language: English - Date: 2012-05-02 03:09:48
860Graphics hardware / Electronics / Nvidia / Video cards / Parallel computing / Hashcash / OpenCL / Proof-of-work system / SHA-1 / Computing / Computer hardware / GPGPU

Hashcash overview OpenCL My implementation of Hashcash

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2013-12-12 07:49:41
UPDATE