Collision resistance

Results: 114



#Item
61Hashing / SHA-1 / MD4 / SHA-2 / MD5 / Crypt / Collision attack / Collision resistance / Preimage attack / Cryptography / Cryptographic hash functions / Error detection and correction

Find Me a Hash Susan Landau W e’re accustomed to hearing about

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2006-02-08 14:25:14
62Espionage / Collision resistance / D3 road / Preimage attack / Hash function / Padding / Collision attack / D24 road / D22 road / Cryptography / Cryptographic hash functions / Hashing

OFFICIAL COMMENT: Khichidi-1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:56:06
63Espionage / SHA-2 / Cyberwarfare / Collision attack / NIST hash function competition / Hash function / Collision resistance / Computing / Collision / Cryptographic hash functions / Hashing / Cryptography

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:42:06
64Hashing / Search algorithms / Preimage attack / Collision resistance / Merkle–Damgård construction / JH / Collision attack / Hash function / Random oracle / Cryptography / Cryptographic hash functions / NIST hash function competition

SHA-3 Conference, March 2012, Improved Indifferentiability Security Bound for the JH Mode Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:56:40
65Preimage attack / Keccak / SHA-1 / SHA-2 / Collision resistance / Random oracle / Grøstl / MD5 / Hash function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Security Analysis and Commparison of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:31:40
66Hashing / Message authentication codes / SHA-2 / HMAC / SHA-1 / Collision resistance / Collision / Preimage attack / NIST hash function competition / Cryptography / Error detection and correction / Cryptographic hash functions

NIST SP[removed]Draft, Recommendation for Applications Using Approved Hash Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:03:49
67SHA-2 / Hashing / Preimage attack / Collision resistance / NIST hash function competition / Crypt / Hash function / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 10:20:26
68Road transport / Texas Department of Transportation / United States railroad regulation / Austin /  Texas / Texas / Traffic collision / Transport / Land transport / Car safety

Quantitative Relationship between Crash Risks and Pavement Skid Resistance (

Add to Reading List

Source URL: ntl.bts.gov

Language: English - Date: 2014-07-09 11:36:38
69One-way function / Cryptographic hash function / Lattice / Hash function / Ideal lattice cryptography / Random oracle / Collision resistance / Trapdoor function / Cryptography / Lattice-based cryptography / Lattice problem

A Compact Signature Scheme with Ideal Lattice (Extended Abstract) Keita Xagawa ∗ Keisuke Tanaka ∗

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:04
70SHA-2 / RIPEMD / MD5 / Preimage attack / SHA-1 / MD4 / Collision attack / Collision resistance / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft PowerPoint - preneel_hash_albenav2_print.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-06-30 04:42:21
UPDATE