Cryptographic hash function

Results: 1121



#Item
101

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-09 19:41:15
    102Cryptography / Serge Vaudenay / Provable security / Zhang Fangguo / Cryptographic primitive / Willy Susilo / Block cipher / Cryptographic hash function

    - Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    Language: English - Date: 2015-08-13 01:39:17
    103Cryptography / Cryptographic protocols / Public-key cryptography / Search algorithms / Elliptic Curve Digital Signature Algorithm / Elliptic curve cryptography / Hash function / X.509 / SHA-2

    RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.

    Add to Reading List

    Source URL: www.ietf.org

    Language: English - Date: 2015-07-23 10:29:05
    104Cryptography / Information retrieval / Search algorithms / Information science / Cryptographic hash functions / Hashing / Error detection and correction / Hash table / SHA-1 / Version vector / Hash function / Euclidean vector

    Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

    Add to Reading List

    Source URL: www.oceanstore.org

    Language: English - Date: 2003-03-13 15:50:35
    105Cryptography / Hashing / Error detection and correction / Public-key cryptography / Search algorithms / Digital signature / Cryptographic hash function / Post-quantum cryptography / RSA / Hash function / Merkle tree / MD5

    SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

    Add to Reading List

    Source URL: cryptojedi.org

    Language: English - Date: 2014-10-04 10:08:48
    106Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

    SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    107Message authentication codes / CBC-MAC / Block cipher / SHA-1 / Cryptographic hash function / Padding / UMAC / Hash-based message authentication code / Hash function / One-way compression function / Galois/Counter Mode

    A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:26
    108Computing / Internet / Software / Internet privacy / Computer networking / Internet protocols / Network performance / Proxy server / Reverse proxy / Transport Layer Security / Cryptographic hash function / Load balancing

    Validating Web Content with Senser Jordan Wilberding Georgetown University Andrew Yates Georgetown University

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2013-10-29 13:52:26
    109Cryptography / Applied mathematics / Block cipher / Stream cipher / Cryptographic hash function / Cryptanalysis / Data Encryption Standard / Joan Daemen / VEST / Cipher / Symmetric-key algorithm / Selected Areas in Cryptography

    PDF Document

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:23
    110Public-key cryptography / Elliptic Curve DSA / Hash function / Key / Wallet / Cryptographic nonce / SHA-2 / Cryptography / Bitcoin / Peer-to-peer computing

    Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

    Add to Reading List

    Source URL: www.cs.technion.ac.il

    Language: English - Date: 2014-05-26 22:22:44
    UPDATE