Cryptographic hash function

Results: 1121



#Item
201Apache Tomcat / Cryptographic hash function / Cryptography / Science / Software / Java enterprise platform / Computing

A NEW PLATFORM FOR A NEW ERA Apache Tomcat and SSL Mark Thomas, Staff Engineer, Pivotal

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-03-27 16:26:23
202HMAC / Cryptographic hash function / Internet protocols / Cryptographic protocols / Key / FIPS 140-2 / Cryptography standards / SHA-2 / Cryptography / Message authentication codes / Hashing

FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:56:45
203RSA / Group signature / Cryptographic hash function / Blind signature / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
204Search algorithms / Hashing / Preimage attack / Merkle–Damgård construction / Hash function / Alexander Sotirov / Cryptographic hash functions / Cryptography / MD5

MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-26 13:48:46
205MD5 / Hash function / Cryptographic hash functions / Public key certificate / Hash chain / Cryptography / Hashing / Search algorithms

PayWord and MicroMint: Two simple micropayment schemes Ronald L. Rivest∗ and Adi Shamir∗∗ April 27, 2001 ∗

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:54
206RSA / Full Domain Hash / Cryptographic hash function / Random oracle / PKCS / Lamport signature / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

Chapter 12 Digital signatures In the public key setting, the primitive used to provide data integrity is a digital signature scheme. In this chapter we look at security notions and constructions for this primitive.

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:36:52
207Hashing / Hash function / SHA-2 / Key stretching / Crypt / Password / One-way compression function / Tabulation hashing / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-02-01 12:00:10
208MD5 / Hash function / Cryptographic hash functions / Public key certificate / Hash chain / Cryptography / Hashing / Search algorithms

PayWord and MicroMint: Two simple micropayment schemes Ronald L. Rivest∗ and Adi Shamir∗∗ April 27, 2001 ∗

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2005-01-15 19:23:54
209File sharing networks / Hashing / Peer-to-peer / Distributed hash table / Computing / Cryptography / Cryptographic hash function / Routing / Science / Distributed data storage / Reputation management / Sybil attack

Christopher T Lesniewski-Laas Updated March 2010 Contact Information

Add to Reading List

Source URL: lesniewski.org

Language: English - Date: 2010-03-13 22:43:23
210Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management

Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2004-08-02 17:51:17
UPDATE