Cryptographic hash function

Results: 1121



#Item
431NIST hash function competition / Keccak / Hashing / Search algorithms / Joan Daemen / SHA-1 / MD5 / Hash function / Universal quantification / Error detection and correction / Cryptographic hash functions / Cryptography

Keccak and SHA-3: code and standard updates Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-18 08:01:24
432Information science / Artificial intelligence / Hash table / Trie / Hash function / Hash array mapped trie / Cryptographic hash function / Perfect hash function / Universal hashing / Hashing / Search algorithms / Information retrieval

Ideal Hash Trees Phil Bagwell Hash Trees with nearly ideal characteristics are described. These Hash Trees require no initial root hash table yet are faster and use significantly less space than chained or double hash tr

Add to Reading List

Source URL: lampwww.epfl.ch

Language: English - Date: 2001-10-05 03:05:47
433Hashing / Hash function / Optimal asymmetric encryption padding / Crypt / Full Domain Hash / SHA-2 / Lamport signature / Cryptography / Cryptographic hash functions / Search algorithms

Extendable-Output Functions (XOFs) Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:38
434Key management / Electronic commerce / Implicit certificate / SHA-1 / Public key certificate / Hash function / Secure Hash Standard / NIST hash function competition / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
435Key management / Electronic commerce / Implicit certificate / SHA-1 / Public key certificate / Hash function / Secure Hash Standard / NIST hash function competition / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
436Key management / Implicit certificate / Electronic commerce / Hash function / SHA-1 / Collision resistance / Digital signature / Public key certificate / Elliptic curve cryptography / Cryptography / Cryptographic hash functions / Public-key cryptography

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Matthew Campagna ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:13
437Keccak / NIST hash function competition / SHA-2 / Preimage attack / Merkle–Damgård construction / Crypt / Hash tree / SHA-1 / Secure Hash Standard / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:37
438Randomness / Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Random number generation / Cryptographic hash function / Hash function / Fortuna / Pseudorandom generator / Cryptography / Theoretical computer science / Applied mathematics

Chalmers Publication Library Splittable Pseudorandom Number Generators using Cryptographic Hashing This document has been downloaded from Chalmers Publication Library (CPL). It is the author´s version of a work that was

Add to Reading List

Source URL: publications.lib.chalmers.se

Language: English - Date: 2013-09-18 07:30:31
439Random oracle / Oracle machine / Hash function / One-way compression function / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 Center for Information Security Technologies(CIST), Korea Universit

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-03-05 01:27:34
440Oblivious transfer / Models of computation / Randomness / Random oracle / Oracle machine / Advantage / Optimal asymmetric encryption padding / Secure two-party computation / Random function / Cryptography / Cryptographic protocols / Cryptographic hash functions

Extending Oblivious Transfers Efficiently Yuval Ishai1 , Joe Kilian2 , Kobbi Nissim2? , and Erez Petrank1?? 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:56
UPDATE