Cryptographic hash function

Results: 1121



#Item
91Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
92Information retrieval / Hashing / Error detection and correction / Information science / Computer programming / Cryptographic hash functions / Search algorithms / Distributed data storage / Bloom filter / Hash function / Hash list / Trie

Data Discovery and Dissemination with DIP tinyos-2.x/tos/lib/net/dip Kaisen Lin UC San Diego

Add to Reading List

Source URL: sing.stanford.edu

Language: English - Date: 2014-11-10 18:30:10
93Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Zero-knowledge proof / Cryptographic hash function / Coin flipping / Universal composability / Cryptographic primitive / One-way function / Claw-free permutation / RSA

Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-06-28 21:51:08
94Cryptography / Hashing / Error detection and correction / Cryptographic hash functions / Search algorithms / Commitment scheme / Hash function / Coin flipping / RSA / Crypt

Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-03-01 16:01:06
95Cryptography / Key management / E-commerce / Public-key cryptography / Cryptocurrencies / Bitcoin / Elliptic Curve Digital Signature Algorithm / RSA / Electronic money / Key / Digital signature / Cryptographic hash function

Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:32:41
96Cryptography / Books on cryptography / Elliptic curve cryptography / Cryptanalysis / RSA / Key size / Public-key cryptography / Cryptographic hash function / Outline of cryptography / Cipher / Block cipher / Elliptic curve

The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-06-30 10:38:30
97Information retrieval / Hashing / Information science / Search algorithms / Error detection and correction / Cryptography / Cryptographic hash functions / Arrays / Hash table / Hash function / Hash list / Hash

Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗

Add to Reading List

Source URL: www.stat.washington.edu

Language: English - Date: 2010-03-17 13:23:00
98Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-09-24 10:22:35
99Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

Introduction MD New Results I

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
100Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

Add to Reading List

Source URL: www.anf.es

Language: English - Date: 2014-05-12 07:16:17
UPDATE