Cryptographic hash function

Results: 1121



#Item
191Hashing / MD5 / Search algorithms / Collision attack / Padding / X.509 / Hash function / RSA / Cryptography / Public-key cryptography / Cryptographic hash functions

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1

Add to Reading List

Source URL: deweger.xs4all.nl

Language: English
192Luby transform code / Erasure code / Forward error correction / Cryptographic hash function / Reed–Solomon error correction / Hash function / Decoder / Digital signature / Systematic code / Coding theory / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:22
193Digital signature / Hash function / Post-quantum cryptography / Lamport signature / Cryptography / Cryptographic hash function / Collision resistance

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 15:13:59
194Public-key cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash function / Hash tree / Collision attack / RSA / MD5 / Cryptography / Hashing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
195Information science / Artificial intelligence / Tabulation hashing / Hash function / Linear probing / Cuckoo hashing / Cryptographic hash function / Hash list / Universal hashing / Hashing / Search algorithms / Information retrieval

May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

Add to Reading List

Source URL: old-madalgo.au.dk

Language: English - Date: 2013-05-10 08:51:10
196Computer programming / Search algorithms / Compiler construction / Error detection and correction / Hash function / Cryptographic hash function / Hash table / Lexical analysis / Parsing / Computing / Software engineering / Hashing

Code Similarity Detection in Multiple Large Source Trees using Token Hashes Dr. Warren Toomey School of IT, Bond University Queensland. Australia

Add to Reading List

Source URL: minnie.tuhs.org

Language: English - Date: 2011-12-11 22:34:52
197Error detection and correction / Cryptography / Information retrieval / Computing / Hash table / Hash function / Rainbow table / NTLM / Hash / Search algorithms / Hashing / Cryptographic hash functions

Advancements in TMTOs Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12 1

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:19:04
198Error detection and correction / Search algorithms / Hash function / MD5 / Collision / SHA-1 / Hash list / Claw-free permutation / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:44:47
199X.509 / RSA / Public key certificate / Padding / Digital signature / Cryptographic hash function / Arjen Lenstra / PKCS / Collision attack / Cryptography / Public-key cryptography / MD5

Colliding X.509 Certificates version 1.0, 1st March 2005 Arjen Lenstra1,2 , Xiaoyun Wang3 , and Benne de Weger2 1

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2005-03-01 03:48:44
200Hash function / RSA / BLS / Lamport signature / Cryptography / Digital signature / Cryptographic hash function

Chameleon Signature from Bilinear Pairing

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-17 03:10:04
UPDATE