Cryptographic hash function

Results: 1121



#Item
461Randomness / Key management / Pseudorandomness / Randomness extractor / Key derivation function / Extractor / Random number generation / Cryptographic hash function / Key / Cryptography / Applied mathematics / Theoretical computer science

Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk∗ Abstract In spite of the central role of key derivation functions (KDF) in applied cryptography, there

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-10 19:09:23
462Common Criteria / Evaluation / Keystore / Protection Profile / Security Target / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Swedish Certification Body for IT Security Certification Report - Filkrypto 1.0 Issue: 1.0, 2007-Oct-05 Responsible: Anders Staaf

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2011-10-24 10:09:10
463Search algorithms / Computer performance / Software optimization / Cryptographic hash functions / Error detection and correction / Hash function / Trie / SHA-1 / Algorithm / Computing / Statistics / Computer programming

HyperLogLog in Practice: Algorithmic Engineering of a State of The Art Cardinality Estimation Algorithm Stefan Heule Marc Nunkesser

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2013-02-06 17:19:53
464Data types / Hashing / Search algorithms / Error detection and correction / Hash function / Pointer / Cryptographic hash function / C / Array data type / Computing / Software engineering / Computer programming

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 14, A Simple Mechanism for Type Security Across Compilation Units MICHAEL L. SCOTT

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2004-06-23 16:50:23
465Threefish / Skein / NIST hash function competition / SHA-1 / SHA-2 / Tiny Encryption Algorithm / MD5 / Differential cryptanalysis / Churning / Cryptography / Error detection and correction / Cryptographic hash functions

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-24 03:49:53
466Crime prevention / National security / Computer network security / Trusted system / Cryptographic hash function / Cryptographic engineering / XTS-400 / Security / Cryptography / Computer security

A Cryptographically-Based Operating System Security Model That Protects against Privileged Attackers Christian Payne This thesis is presented for the

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2011-02-17 01:18:57
467Radio-frequency identification / Wireless / Needham–Schroeder protocol / IP / Public-key cryptography / Cryptographic hash function / Cryptography / Cryptographic protocols / Automatic identification and data capture

A Light-weight Security Protocol for RFID System.

Add to Reading List

Source URL: dl.ifip.org

Language: English - Date: 2014-08-10 19:38:24
468Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak Computer Science & Engineering Department, Haldia Institute of Technology, Haldia, India – 721657, E-mail – [removed] Abstract:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-06 05:29:27
469SHA-2 / Secure Shell / Password / Cryptographic hash function / Cryptographic software / Hash function / Crypt / Key / Cryptlib / Cryptography / Hashing / HMAC

Why is My App So Slow? (hint – it’s probably MySQL)

Add to Reading List

Source URL: doboard.com

Language: English - Date: 2009-04-24 14:18:17
470Search algorithms / Information retrieval / Computing / Cryptographic hash functions / Hash function / Hash join / Relational database / Trie / Join / Hashing / Data management / Error detection and correction

APPLYING HASH FILTERS TO IMPROVING EXECUTION OF BUSHY TREES

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:13:59
UPDATE