SHA-2

Results: 893



#Item
141Software engineering / SHA-2 / Checksum / SHA-1 / Perl / Computing / Cryptographic hash functions / Computer programming

Perl versiondocumentation - shasum NAME shasum - Print or Check SHA Checksums SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:57:42
142SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
143Internet protocols / Secure communication / PKCS / Cryptographic hash function / Cipher suite / Crypto++ / MD4 / SHA-2 / Transport Layer Security / Cryptography / Cryptographic software / Cryptography standards

  CycloneCrypto is a cryptographic toolkit designed for use in embedded systems. It provides a comprehensive set of

Add to Reading List

Source URL: www.oryx-embedded.com

Language: English - Date: 2015-01-25 07:33:55
144Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
145Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
146Padding / Collision attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2

Semi-free start collision attack on Blender

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 20:38:01
147Preimage attack / ICE / SHA-2 / SHA-1 / Hash function / VEST / Block cipher / Grøstl / Collision resistance / Cryptography / Error detection and correction / Cryptographic hash functions

SPONGENT: The Design Space of Lightweight Cryptographic Hashing Andrey Bogdanov1 , Miroslav Kneˇzevi´c1,2 , Gregor Leander3 , Deniz Toz1 , Kerem Varıcı1 , and Ingrid Verbauwhede1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 12:38:00
148Cryptographic protocols / Hashing / Password / Salt / Rainbow table / Hash table / Crypt / Random oracle / SHA-2 / Cryptography / Cryptographic hash functions / Search algorithms

Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions Fabrice Benhamouda and David Pointcheval ENS, Paris, France ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-10-14 17:20:37
149SHA-2 / SHA-1 / NIST hash function competition / HMAC / Keccak / Skein / Crypt / Side channel attack / Computer security / Error detection and correction / Cryptographic hash functions / Cryptography

An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture Simon Hoerder1 , Marcin Wojcik1 , Stefan Tillich1 , Dan Page1 {hoerder, wojcik, tillich, page}@compsci.bristol.ac.uk Department of Comp

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-01 12:22:01
150Cyberwarfare / Applied mathematics / Security / Cryptographic hash functions / Advantage / SHA-2

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions Hidenori Kuwakado Masakatu Morii

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-07 20:24:31
UPDATE