Cryptographic hash function

Results: 1121



#Item
401Hashing / Randomness / Information theory / Search algorithms / Entropy / SHA-2 / Hash function / HMAC / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions Danilo Gligoroski1 and Vlastimil Klima2 1 Faculty of Information Technology, Mathematics and Electrical Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-07-31 05:53:00
402Advanced Encryption Standard / Ciphertext / Cryptographic hash functions / Stream ciphers / One-way compression function / Cryptography / Block cipher / Transposition cipher

Microsoft Word - DN_HDN_EN.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-14 11:21:26
403Hashing / Error detection and correction / Hash function / Collision attack / Padding / Espionage / Cyberwarfare / Information retrieval / Cryptographic hash functions / Cryptography / Search algorithms

formát Název-moje šablona pro docy

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-11-18 20:27:25
404NIST hash function competition / Hash function / Rotational cryptanalysis / Cryptanalysis / Threefish / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

Add to Reading List

Source URL: people.item.ntnu.no

Language: English - Date: 2010-11-15 08:00:24
405Computing / SHA-2 / Hash function / Endianness / Preimage attack / Bit array / Hexadecimal / MD5 / GOST / Error detection and correction / Cryptography / Cryptographic hash functions

Cryptographic Hash Function B LUE M IDNIGHT W ISH Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: people.item.ntnu.no

Language: English - Date: 2009-09-10 07:24:20
406SHA-1 / Preimage attack / MD5 / MD4 / Padding / RIPEMD / Collision attack / Birthday attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2

On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com Abstract.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-22 14:38:17
407Merkle–Damgård construction / Information retrieval / Artificial intelligence / Computing / Cryptographic hash functions / NIST hash function competition / Hash function

1 Cryptographic Hash Function EDON-R Presented by Prof. Danilo Gligoroski

Add to Reading List

Source URL: csrc.nist.gov

Language: English
408Hashing / Search algorithms / Preimage attack / Rope / Entailment / Collision attack / Hash function / Logic / Cryptographic hash functions / Cryptography

formát Název-moje šablona pro docy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-02 11:28:32
409Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
410Public-key cryptography / Internet standards / Secure communication / Transport Layer Security / Cipher suite / SHA-2 / Collision attack / SHA-1 / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

Deploying a New Hash Algorithm Steven M. Bellovin [removed] Columbia University Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:39
UPDATE