Security of cryptographic hash functions

Results: 47



#Item
1Cryptography / Password / Security / Cryptographic hash functions / Challengeresponse authentication / Crypt / Password cracking / Password policy

Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
2Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
3Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-12-09 05:42:43
4

. . Security Reductions of Cryptographic Hash Functions .

Add to Reading List

Source URL: www1.spms.ntu.edu.sg

Language: English - Date: 2011-08-31 02:03:42
    5

    . . Security Reductions of Cryptographic Hash Functions .

    Add to Reading List

    Source URL: web.spms.ntu.edu.sg

    Language: English - Date: 2012-03-13 12:15:13
      6

      Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English - Date: 2012-08-24 06:11:58
        7Random oracle / Relational database management systems / Cross-platform software / Oracle Database / Cryptography / Software / Cryptographic hash functions

        Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

        Add to Reading List

        Source URL: www.easycrypt.info

        Language: English - Date: 2015-06-04 11:02:41
        8Coding theory / Finite fields / Information / Cryptography / Network coding / Hash function / Hash list / Very smooth hash / Homomorphic signatures for network coding / Hashing / Cryptographic hash functions / Error detection and correction

        1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+

        Add to Reading List

        Source URL: www.cs.cuhk.hk

        Language: English - Date: 2011-05-19 23:15:34
        9Parity of a permutation / Permutations / Model theory / Cryptographic hash functions / Homomorphic signatures for network coding / Mathematics / Group theory / Parity

        Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

        Add to Reading List

        Source URL: certicrypt.gforge.inria.fr

        Language: English
        10Environmental Working Group / Conscription in the United States / Security / Cryptographic hash functions / SHA-2 / Universally unique identifier

        ICH M2 EWG Work Plan 13 March 2015 Topic Adopted: 1994 Last Face-to-Face Meeting: Lisbon, November 2014 The following roles and responsibilities of M2 were approved by the SC: 1) Provide overview of ICH and SDO technical

        Add to Reading List

        Source URL: www.ich.org

        Language: English - Date: 2015-04-02 02:41:29
        UPDATE