Cryptographic hash function

Results: 1121



#Item
291Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:36:20
292Hashing / SHA-2 / SHA-1 / Secure Hash Standard / HMAC / Crypt / Hash function / Padding / NSA Suite B Cryptography / Error detection and correction / Cryptographic hash functions / Cryptography

fipswith change notice.doc

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2004-09-21 12:04:14
293Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Man-in-the-middle attack / Cryptographic hash function / X.509 / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-04 16:50:19
294Checksum / Electronic Common Technical Document / MD5 / Cryptographic hash function / Cksum / Sum / Simple file verification / Computing / Software / Unix

Microsoft Word - File Security - MD5 v1_0-hwm.doc

Add to Reading List

Source URL: estri.org

Language: English - Date: 2012-06-05 01:13:02
295MD5 / Pseudorandom function family / Pseudorandomness / Cryptographic hash function / Initialization vector / Integrated Encryption Scheme / Cryptography / Block cipher / Advantage

A preliminary version of this paper appeared in Advances in Cryptology – Crypto 95 Proceedings, Lecture Notes in Computer Science Vol. 963, D. Coppersmith ed., Springer-Verlag, 1995. XOR MACs: New Methods for Message A

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-02-28 15:02:35
296Bitcoin / Peer-to-peer computing / Proof-of-work system / Commitment scheme / Hash tree / Consensus / Cryptographic hash function / RSA / Cryptography / Public-key cryptography / Hashing

CommitCoin: Carbon Dating Commitments with Bitcoin? Jeremy Clark1 and Aleksander Essex2 1 Carleton University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-15 00:09:47
297Search algorithms / Computational complexity theory / Random oracle / Interactive proof system / Hash function / Zero-knowledge proof / Universal hashing / Collision resistance / Hash list / Cryptography / Cryptographic hash functions / Hashing

— A merged version of this work and the work of [DJKL12] appears in the proceedings of the Theory of Cryptography Conference - TCC 2013 — Why “Fiat-Shamir for Proofs” Lacks a Proof Nir Bitansky∗ Tel Aviv Univer

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-19 16:42:35
298One-way function / Pseudorandom generator theorem / Hard-core predicate / Random oracle / Verifiable random function / Trapdoor function / Pseudorandom function family / Pseudorandom generator / Pseudorandom permutation / Cryptography / Pseudorandomness / Cryptographic hash functions

Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 13:18:51
299SHA-1 / MD4 / MD5 / Differential cryptanalysis / RIPEMD / Hamming weight / A5/1 / ICE / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-19 18:19:12
300Optimal asymmetric encryption padding / Claw-free permutation / Combinatorics / One-way function / Advantage / Random oracle / Parity of a permutation / Trapdoor function / Full Domain Hash / Cryptography / Permutations / Cryptographic hash functions

On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1 Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 12:09:46
UPDATE