Security of cryptographic hash functions

Results: 47



#Item
31Error detection and correction / Cryptography / Computing / Security / Hash tree / Venti / Trusted Platform Module / Cache / Hash list / Hashing / Computer security / Cryptographic hash functions

Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cam

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
32Search algorithms / Error detection and correction / Collision attack / Merkle–Damgård construction / Preimage attack / Hash function / Digital signature / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Hashing

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
33Computing / Cryptographic hash functions / Information / Internet protocols / Internet standards / Hash tree / Hash list / Hash function / Transport Layer Security / Hashing / Error detection and correction / Cryptography

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
34Cryptographic hash functions / Electronic Signatures in Global and National Commerce Act / Electronic signature / Digital signature / RSA / Provable security / IEEE P1363 / SHA-1 / Cryptography / Public-key cryptography / CRYPTREC

Report on Present State of ESIGN Signature Evaluation (full evaluation) January 28, 2002 Yasuyuki Sakai, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
35SHA-2 / Cryptographic Module Validation Program / SHA-1 / FIPS 140-2 / Digital Signature Algorithm / FIPS 140 / Key size / Transport Layer Security / Triple DES / Cryptography / Cryptography standards / Cryptographic hash functions

Comments Received on the Second Review of SP 800‐131  (Recommendation for the Transitioning of Cryptographic Algorithms and  Key Lengths)  Lovell King II, Dept. of State .............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:29:16
36Preimage attack / Advantage / SHA-1 / SHA-2 / Random oracle / Hash function / Grøstl / One-way compression function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Provable Security of BLAKE with Non-Ideal Commpressio Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:14:18
37Preimage attack / Keccak / SHA-1 / SHA-2 / Collision resistance / Random oracle / Grøstl / MD5 / Hash function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Security Analysis and Commparison of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:31:40
38National Institute of Standards and Technology / Applied mathematics / Cyberwarfare / Computing / Cryptographic hash functions / NIST hash function competition / Electronic submission

This workshop considers the full range of public key technology used for security decisions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:51:26
39Cryptographic software / Cryptographic hash functions / Internet protocols / Internet standards / Secure communication / SHA-1 / Transport Layer Security / Public-key cryptography / HMAC / Cryptography / Error detection and correction / Computing

Cryptographic Technology Group Lily Chen, Acting Manager of CTG June 4, 2013 Z M (padded)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-04 17:39:21
40HashKeeper / National Software Reference Library / Computer file / Computer security / Hash list / Computing / Hashing / Cryptographic hash functions / Error detection and correction

2003 CYBER CRIME CONFERENCE Effectiveness of Hash Sets Douglas White National Institute of Standards & Technology

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2003-12-09 19:03:52
UPDATE