Back to Results
First PageMeta Content
Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction


Provably Secure Cryptographic Hash Functions
Add to Reading List

Document Date: 2006-12-20 22:26:42


Open Document

File Size: 630,12 KB

Share Result on Facebook

City

Sydney / /

Company

IBM / /

Facility

University of New South Wales / /

IndustryTerm

hash algorithms / cryptographic protocols / cryptographic applications / important applications / /

Organization

University of New South Wales / Contents Chapter / Richard Buckland School of Mathematics / /

Person

James Franklin / Roland / Catherine Greenhill / Tara / Hans Peter Luhn / Richard Buckland / Jim Franklin / /

Position

supervisor / /

ProvinceOrState

Maryland / New South Wales / /

Region

South Wales / /

Technology

hash algorithms / cryptography / 6.5 Approximation Algorithms / MD5 Algorithm / 3.3 Domain Extender Algorithms / SHA-1 Algorithm / /

SocialTag