<--- Back to Details
First PageDocument Content
Checksum / SHA-1 / Hash function / SHA-2 / Preimage attack / Transmission Control Protocol / Collision attack / Padding / Accumulator / Cryptography / Cryptographic hash functions / Hashing
Date: 2008-12-20 14:32:33
Checksum
SHA-1
Hash function
SHA-2
Preimage attack
Transmission Control Protocol
Collision attack
Padding
Accumulator
Cryptography
Cryptographic hash functions
Hashing

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Download Document from Source Website

File Size: 123,26 KB

Share Document on Facebook

Similar Documents

Performance Evaluation of Checksum-Based ABFT∗ Ahmad A. Al-Yamani, Nahmsuk Oh and Edward J. McCluskey Center for Reliable Computing – Stanford University, Stanford, California {alyamani, nsoh, } A

DocID: 1v9xy - View Document

Software / Computing / System software / Archive formats / Checksum / Sum / Transmission Control Protocol / Tar / MD5 / Adler-32 / Cksum / Fuzz testing

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection

DocID: 1rjKP - View Document

Computing / Patch / Software maintenance / Software release / Cksum / Checksum / NCR Corporation / File Transfer Protocol

EMD Release Status Review October 6, EMD-001 October 6, 2004

DocID: 1r8cL - View Document

Transmission Control Protocol / Cryptographic nonce / Checksum

Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter

DocID: 1r7EO - View Document

Rescue equipment / Beacons / Emergency position-indicating radiobeacon station / Rescue / Law of the sea / International relations / International Cospas-Sarsat Programme / Safety / Checksum / RTCM / Knowledge

SARSAT Beacon Manufacturer’s Workshop September 28, 2012 Regulatory and Type Approval Changes Prepared by: Jesse Reich/NOAA

DocID: 1qVKl - View Document