Cryptographic hash function

Results: 1121



#Item
211Probability theory / Advantage / Oracle machine / Standard model / Oracle Corporation / Pseudorandom function family / Random function / Computational complexity theory / Pseudorandomness / Cryptography / Cryptographic hash functions / Random oracle

The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡ Shai Halevi§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-08-01 15:32:21
212Cryptographic hash function / Advanced Encryption Standard / Disk encryption theory / IEEE P1619 / Cryptography / Block cipher / Cipher

1 Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes Cuauhtemoc Mancillas-L´opez, Debrup Chakraborty and Francisco Rodr´ıguez-Henr´ıquez

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-23 20:00:54
213MD5 / Cryptographic hash function / Computer data storage / Internet / Electronics / Email / Computing / Backup

Page 30 Southwestern Archivist Taming the Wild LISTSERV; or, How to Preserve Specialized E-Mail Lists By Lisa M. Schmidt • MATRIX: The Center for Humane Arts, Letters, and Social Sciences Online, Michigan State Univer

Add to Reading List

Source URL: www2.matrix.msu.edu

Language: English - Date: 2013-05-21 19:36:52
214Key size / Message authentication code / Block cipher / Cryptographic hash function / Cryptography / Symmetric-key algorithm / Cipher

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:27
215Information retrieval / Information science / Universal hashing / Hash function / Hash table / Cryptographic hash function / Tabulation hashing / SUHA / Search algorithms / Hashing / Artificial intelligence

Dictionaries Advanced Algorithms – COMS31900  In a dictionary data structure we store (key, value)-pairs such that for any key there is at most one pair (key, value) in the dictionary.  Often we want to perform the f

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
216Information science / Artificial intelligence / Hash function / Universal hashing / Hash table / Perfect hash function / Cryptographic hash function / Linear probing / Tabulation hashing / Hashing / Search algorithms / Information retrieval

Dictionaries and Hashing recap  A dynamic dictionary stores (key, value)-pairs and supports: add(key, value), lookup(key) (which returns value) and delete(key) Advanced Algorithms – COMS31900

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
217Merkle–Damgård construction / SHA-1 / Collision resistance / MD5 / Collision attack / MDC-2 / Preimage attack / Hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Cryptography / One-way compression function

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
218Block cipher / Function / MD5 / Hashing / GOST / Mathematics / Cryptographic hash functions / Feistel cipher

F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-20 23:47:47
219Pseudorandomness / Computational complexity theory / Randomness / Hashing / Pseudorandom generator theorem / Pseudorandom generator / One-way function / Hard-core predicate / Cryptographic hash function / Cryptography / Theoretical computer science / Applied mathematics

Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-10 11:39:44
220Hashing / Search algorithms / MD5 / X.509 / Simple public key infrastructure / Hash function / HMAC / Cryptographic hash function / Crypt / Cryptography / Public-key cryptography / Key management

Pisces User Manual Release 1.0 alpha 1 Jeremy Hylton April 27, 2000 Corporation for National Research Initiatives

Add to Reading List

Source URL: www.cnri.reston.va.us

Language: English - Date: 2013-05-09 14:48:28
UPDATE