Cryptographic hash function

Results: 1121



#Item
251Information retrieval / Searching / Web crawlers / World Wide Web / Consistent hashing / Robots exclusion standard / Hash function / Hash table / Cryptographic hash function / Hashing / Information science / Search algorithms

UbiCrawler: A Scalable Fully Distributed Web Crawler Paolo Boldi∗ Bruno Codenotti† Massimo Santini‡

Add to Reading List

Source URL: vigna.di.unimi.it

Language: English - Date: 2003-10-19 11:16:51
252Threefish / Rotational cryptanalysis / Cryptographic hash function / Block cipher / Hash function / Cryptanalysis / Cryptography / NIST hash function competition / Skein

The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
253Preimage attack / MD5 / SHA-2 / Hash function / SHA-1 / Hash table / Collision attack / Padding / Tiger / Cryptographic hash functions / Cryptography / Error detection and correction

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
254SHACAL / NIST hash function competition / Ciphertext / SHA-1 / Boomerang attack / Cryptography / Cryptographic hash functions / Block cipher

improved_analysis_of_Shamata-BC.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 03:59:47
255Cryptographic hash function / Hash function / Computing / Information science / Artificial intelligence / Slow-start / Search algorithms / Transmission Control Protocol / Hash table

Efficient and Robust TCP Stream Normalization Mythili Vutukuru and Hari Balakrishnan MIT CSAIL {mythili,hari}@csail.mit.edu Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-03-12 03:14:30
256Cryptography / Hash function / Cryptographic hash function / Hash chain / Artificial intelligence / Cyberwarfare / Applied mathematics / Hashing / Search algorithms / Error detection and correction

Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs John Kelsey and Bruce Schneier Counterpane Internet Security, Inc. 101 E. Minnehaha Pkwy Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
257Computing / Disk encryption / Hashing / Search algorithms / Crypt / MD5 / Payment Card Industry Data Security Standard / Tokenization / Hash function / Cryptography / Cryptographic hash functions / Computer security

PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2015-02-18 09:34:54
258Key / Cryptography / Message authentication code / Cryptographic hash function

Cryptographic Support for Secure Logs on Untrusted Machines Bruce Schneier John Kelsey {schneier,kelsey}@counterpane.com Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
259Information theory / Fortuna / Key management / Entropy / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptographic hash function / Key / Cryptography / Pseudorandom number generators / Randomness

Cryptography Engineering: Design Principles and Practical Applications

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-07 19:29:27
260Hashing / Hash function / Digital signature / MD5 / Lamport signature / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

Appears in Advances in Cryptology { Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. Desmedt, ed., 1994. Incremental Cryptography: The Case of Hashing and Signing 

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 11:58:58
UPDATE