Security of cryptographic hash functions

Results: 47



#Item
41ICE / Block cipher / S-box / VEST / Substitution-permutation network / Differential cryptanalysis / Cryptography / Data Encryption Standard / Cryptographic hash functions

PAIRS AND TRIPLETS OF DES S-BOXES Donald Davies Sean Murphy Information Security Group, Royal Holloway and Bedford New College,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:40
42Cryptographic software / Password / Security Accounts Manager / Cryptographic hash functions / Salt / Challenge-response authentication / Shadow password / Crypt / S/KEY / Cryptography / Computer security / Security

On NT Password Security By: Jos Visser This article is (c) Copyright 1997 Open Solution Providers. It may be referred to or reproduced in full only with full retention of this copyright message. For more information on t

Add to Reading List

Source URL: www.josvisser.nl

Language: English - Date: 2004-10-07 03:31:00
43Password / Cryptographic software / Cryptographic hash functions / Crypt / Salt / SQL injection / Brute-force attack / SHA-2 / Bcrypt / Cryptography / Computer security / Security

Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

Add to Reading List

Source URL: www.scienceandmathacademy.com

Language: English - Date: 2013-06-10 13:55:15
44Computing / Merkle–Damgård construction / SIMD / Symmetry in mathematics / Symmetry / Hash function / Symmetric matrix / Block cipher / Cryptographic hash functions / Error detection and correction / Cryptography

Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-01 05:47:23
45Hashing / NIST hash function competition / Preimage attack / SHA-1 / Keccak / Random oracle / Provable security / MD5 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
46Electronic commerce / RSA / Digital signature / Random oracle / Provably secure cryptographic hash function / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic hash functions

ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-07-13 05:54:26
47NIST hash function competition / Hashing / MD6 / MD5 / MD4 / SHA-2 / SHA-1 / Collision resistance / Preimage attack / Error detection and correction / Cryptography / Cryptographic hash functions

Security Proofs for the MD6 Hash Function Mode of Operation by

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-11-05 16:27:34
UPDATE