Cryptographic hash function

Results: 1121



#Item
261SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
262Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.altcoinfever.com

Language: English - Date: 2014-01-01 18:43:09
263Internet protocols / Secure communication / PKCS / Cryptographic hash function / Cipher suite / Crypto++ / MD4 / SHA-2 / Transport Layer Security / Cryptography / Cryptographic software / Cryptography standards

  CycloneCrypto is a cryptographic toolkit designed for use in embedded systems. It provides a comprehensive set of

Add to Reading List

Source URL: www.oryx-embedded.com

Language: English - Date: 2015-01-25 07:33:55
264MD5 / MD4 / HAVAL / Wang Xiaoyun / X.509 / Hash function / Collision / MD2 / Cryptography / Cryptographic hash functions / Hashing

Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz March 5, 2005

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-08 12:38:58
265Search algorithms / Coding theory / Information theory / Mathematics / Information retrieval / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-02-29 16:05:25
266Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
267Hashing / Cryptographic hash functions / Trusted third party / Hash list / Hash function / Digital signature / RSA / Cryptography / Public-key cryptography / Error detection and correction

Microsoft PowerPoint - 05-Contract-Signing Protocols.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-05 04:11:06
268Hashing / Error detection and correction / Hash function / Preimage attack / MD5 / Advantage / Oracle machine / Random oracle / Quadratic probing / Cryptography / Cryptographic hash functions / Search algorithms

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
269Ciphertext indistinguishability / Oblivious transfer / Computational indistinguishability / Cryptographic hash function / Chosen-ciphertext attack / Zero-knowledge proof / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Common reference string model

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-14 14:54:31
270Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
UPDATE