Back to Results
First PageMeta Content
Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing


Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A
Add to Reading List

Document Date: 2007-05-21 19:29:06


Open Document

File Size: 195,75 KB

Share Result on Facebook

Company

Computer Sciences / Bob / /

Currency

USD / /

Event

M&A / /

IndustryTerm

web interface / encryption software / probabilistic polynomial time algorithm / polynomial time algorithm / web page displays / web-page / /

Movie

D. 3 / /

OperatingSystem

Linux / /

Organization

U.S. Securities and Exchange Commission / Purdue University / Department of Computer Sciences / Center for Education / /

Person

Alice Sign / Bob / Trent / Samuel S. Wagstaff / Jr. / Mallory / William R. Speirs II / /

Position

trusted mediator / administrator / /

Technology

encryption / public key / polynomial time algorithm / signing algorithm / Linux / probabilistic polynomial time algorithm / /

SocialTag