Cryptographic hash function

Results: 1121



#Item
301Checksum / Electronic Common Technical Document / MD5 / Cryptographic hash function / Cksum / Sum / Simple file verification / Computing / Software / Unix

Microsoft Word - File Security - MD5 v1_0-hwm.doc

Add to Reading List

Source URL: estri.ich.org

Language: English - Date: 2012-06-04 19:13:02
302Function / Preimage attack / Image / Inverse function / Valuation / GOST / Mathematics / Cryptography / Cryptographic hash functions

Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-22 12:08:36
303SHA-2 / Computing / Computer programming / Mathematics / Cryptographic hash functions / Hash function / SHA-1

Data-Depend Hash Algorithm ZiJie Xu and Ke Xu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-03-29 20:31:43
304Character encoding / String / Parity of a permutation / Keccak / Cryptographic hash function / Bitcoin / Structure / Hash function / Digital signature / Cryptography / Mathematics / NIST hash function competition

ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER FINAL DRAFT - UNDER REVIEW DR. GAVIN WOOD CO-FOUNDER & LEAD, ETHEREUM PROJECT

Add to Reading List

Source URL: gavwood.com

Language: English - Date: 2015-04-09 07:05:08
305Search algorithms / MD4 / Cryptographic hash function / Collision attack / Crypt / Hash function / Q / Cryptography / Hashing / MD5

Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-03-17 14:14:33
306Cryptographic hash functions / Computer security / Hash tree / Peer-to-peer / Trusted timestamping / Hash function / Digital signature / Hash list / Linked timestamping / Cryptography / Hashing / Error detection and correction

Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1,2 , Andres Kroonmaa1 , and Risto Laanoja1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 18:39:49
307Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-02 17:52:59
308Block cipher / Hash function / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Collision attack

A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-21 12:10:24
309Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 14:07:22
310Stream ciphers / Cryptographic hash functions / Advanced Encryption Standard / Hamming weight / Py / Lookup table / Cryptography / Keccak / NIST hash function competition

Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 21:07:24
UPDATE