Cryptographic hash function

Results: 1121



#Item
441Internet protocols / Public-key cryptography / Internet standards / Key management / DNS spoofing / Domain Name System Security Extensions / Man-in-the-middle attack / Transport Layer Security / Cryptographic hash function / Cryptography / Internet / Domain name system

SEC[removed]E-MAIL SECURITY 805

Add to Reading List

Source URL: authors.phptr.com

Language: English - Date: 2002-08-15 11:31:28
442Computational complexity theory / Randomness extractor / Information theory / Finite fields / Leftover hash lemma / Entropy / XTR / Pseudorandom generator / Cryptographic hash function / Cryptography / Applied mathematics / Randomness

Overcoming Weak Expectations Yevgeniy Dodis∗ Yu Yu† December 22, 2012

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2012-12-22 10:21:59
443Keccak / Threefish / Cryptographic hash function / Joan Daemen / Grøstl / ARM architecture / Crypt / 64-bit / BLAKE / Cryptography / NIST hash function competition / Skein

Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010

Add to Reading List

Source URL: www-pequan.lip6.fr

Language: English - Date: 2011-09-20 16:50:32
444Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
445Computer security / Cryptographic hash function / Traceability / Cyberwarfare / Technology / Security / Metrology / Application security

University of Huddersfield Repository Parkinson, Simon, Longstaff, Andrew P., Crampton, Andrew, Allen, Gary, Fletcher, Simon and Myers, Alan The use of Cryptographic Principles within Metrology Software Original Citation

Add to Reading List

Source URL: eprints.hud.ac.uk

Language: English - Date: 2012-01-26 09:58:39
446Merkle–Damgård construction / Birthday attack / Hash function / One-way compression function / Preimage attack / Cryptography / Cryptographic hash functions / Message authentication codes

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
447Computing / MD5 / Hashing / Function / Qi / Cryptography / Mathematics / Cryptographic hash functions

A Study of the MD5 Attacks: Insights and Improvements John Black and Martin Cochran University of Colorado Trevor Highland University of Texas

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
448Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
449Information theory / Pseudorandomness / Random number generation / Hardware random number generator / National Security Agency / Cryptographic hash function / Entropy / Block cipher / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

NIST Special Publication[removed]Recommendation for Random Number Generation Using Deterministic Random Bit Generators Elaine Barker

Add to Reading List

Source URL: web.archive.org

Language: English
450Information retrieval / Hash function / Locality-sensitive hashing / K-nearest neighbor algorithm / Nearest neighbor search / Hash table / Cryptographic hash function / Machine learning / Search algorithms / Information science / Artificial intelligence

In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June[removed]Fast Image Search for Learned Metrics Prateek Jain Brian Kulis Kristen Grauman Department of Computer Sciences Universi

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2008-08-10 18:06:43
UPDATE