SHA-2

Results: 893



#Item
851SHA-2 / One-way compression function / Differential cryptanalysis / MD5 / SHACAL / Hash function / Preimage attack / Collision attack / Boomerang attack / Cryptography / Cryptographic hash functions / SHA-1

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-20 11:25:59
852SHA-2 / NIST hash function competition / Crypt / Hash function / Skein / Hash list / Computer programming / Artificial intelligence / Key stretching / Cryptographic hash functions / Field-programmable gate array / Computing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 04:31:20
853SHA-1 / Preimage attack / MD5 / Collision attack / NIST hash function competition / Padding / Collision resistance / Cryptographic hash functions / Cryptography / SHA-2

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-28 08:32:30
854Cryptography / SHA-1 / SHA-2 / NaSHA / SANDstorm hash / Elliptic curve only hash / Keccak / Collision attack / Preimage attack / Error detection and correction / NIST hash function competition / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-19 10:02:27
855Preimage attack / Collision attack / SHA-1 / MD5 / SHA-2 / Collision resistance / Tiger / Hash function / Hash tree / Cryptographic hash functions / Cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-02-18 13:57:44
856SHA-2 / SHA-1 / Secure Hash Standard / Digital Signature Algorithm / NIST hash function competition / HMAC / Crypt / Message authentication code / CRYPTREC / Cryptographic hash functions / Cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-12 13:46:08
857Message authentication codes / Cryptographic hash functions / Block cipher / Galois/Counter Mode / SHA-2 / Advanced Encryption Standard / Key size / FIPS 140-2 / Secure Hash Standard / Cryptography / Block cipher modes of operation / Cryptography standards

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 08:42:48
858SHA-2 / SHA-1 / Preimage attack / Padding / Advanced Encryption Standard / Block cipher / NIST hash function competition / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:28
859SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:48:42
860Hashing / Search algorithms / SHA-1 / SHA-2 / Hash function / Padding / HMAC / Bit array / Provably secure cryptographic hash function / Error detection and correction / Cryptographic hash functions / Cryptography

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:01:56
UPDATE