Cryptographic hash function

Results: 1121



#Item
381Notary / Electronic commerce / Digital signature / Non-repudiation / Public key infrastructure / Electronic signature / Cryptographic hash function / Public key certificate / Electronic business / Cryptography / Public-key cryptography / Key management

Singapore Journal of International & Comparative Law[removed]pp 183–200 Digital Signatures, Certification Authorities: Certainty in the Allocation of Liability Yee Fen Lim∗

Add to Reading List

Source URL: www.commonlii.org

Language: English - Date: 2010-03-01 06:47:15
382RSA / Dining cryptographers problem / Cryptographic hash function / Hash function / XTR / Email / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 1998 Final Exam

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-05 14:35:42
383Public-key cryptography / Internet protocols / Homomorphic encryption / Secret sharing / HMAC / Encryption / Cryptographic hash function / Wireless sensor network / Database / Cryptography / Cryptographic protocols / Hashing

Secure and Efficient In-Network Processing of Exact SUM Queries Stavros Papadopoulos 1 , Aggelos Kiayias 2 , Dimitris Papadias 3 1 Department of Computer Science and Engineering

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:45
384Search algorithms / Computing / Cryptography / Computer programming / Information retrieval / Hash function / Hash tree / SHA-1 / Bin / Hashing / Cryptographic hash functions / Error detection and correction

CADS: Continuous Authentication on Data Streams Stavros Papadopoulos Yin Yang Dimitris Papadias

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:50
385RSA / Dining cryptographers problem / Cryptographic hash function / Hash function / XTR / Email / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 1998 Final Exam

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-03-02 16:04:37
386Electronic signature / Cryptographic hash function / Hysteresis / Elliptic Curve DSA / Signature / SHA-1 / Message authentication code / RSA / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:46
387Theoretical computer science / Applied mathematics / Error detection and correction / Quantum key distribution / Computer arithmetic / Cryptographic hash function / Hash function / Hamming / MD5 / Cryptography / Quantum information science / Quantum cryptography

3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. O

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:58:38
388Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Paragraph[removed]of the Code of Ethics Estate agents and salespersons should be fully conversant with the EAO, its subsidiary legislation, this Code of Ethics, and other guidelines issued by the EAA from time to time and

Add to Reading List

Source URL: text.eaa.org.hk

Language: English - Date: 2013-07-22 00:20:20
389Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski [removed] Faculty of Information Technology, Mathematics and Electrical Engin

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-12-04 13:55:47
390Internet standards / Internet protocols / Information technology management / Simple Network Management Protocol / System administration / Email / RMON / Cryptographic hash function / Management information base / Computing / Network management / Internet

TM The Simple Times THE QUARTERLY NEWSLETTER OF SNMP TECHNOLOGY, COMMENT, AND EVENTS SM VOLUME 4, NUMBER 1

Add to Reading List

Source URL: www.simple-times.org

Language: English - Date: 1998-03-27 05:07:37
UPDATE