Cryptographic hash function

Results: 1121



#Item
521Preimage attack / GOST / SHA-1 / MD5 / SHA-2 / Hash function / Hash table / Function / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-29 21:47:28
522VMware / Anti-cheat software / Fault-tolerant computer systems / Cheating in video games / PunkBuster / Cheating in online games / Replication / Cryptographic hash function / Hash function / Software / System software / Computing

Accountable Virtual Machines

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2010-09-22 09:13:35
523Crypt / RadioGatún / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hash function

X-Sieve: CMU Sieve 2.2 Subject: Comments on Hash Function Criteria Date: Fri, 27 Apr[removed]:28:[removed]X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: Comments on Hash Function Criteria

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:24:16
524CRYPTREC / Collision resistance / Random oracle / Preimage attack / HMAC / Hash function / Crypt / Outline of cryptography / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:08:26
525McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 04:29:49
526Error detection and correction / Message authentication codes / Search algorithms / HMAC / Hash function / Collision / Digital signature / Algorithm / SHA-2 / Cryptography / Hashing / Cryptographic hash functions

Comments on NIST Draft Requirements and Criteria for Hash Algorithm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:56:14
527Cryptographic hash function / Two-factor authentication / Service-oriented architecture / Electronic signature / Digital signature / Password cracking / Skype security / Cryptography / Security / Password

Microsoft Word - IDEM eAuth Success Story ks edit.docx

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2014-07-31 19:42:26
528Hashing / SHA-1 / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Search algorithms

X-Sieve: CMU Sieve 2.2 DKIM-Signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:mimeversion:content-type; b=hpQBvkv1eVIC20ITx1GF9QzMkMgj4

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:59:50
529Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:33
530Search algorithms / Hash function / Information retrieval / Artificial intelligence / Information science / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

X-Sieve: CMU Sieve 2.2 From: Tolga Acar To: "hash-function@nist.gov" CC: Brian LaMacchia Date: Fri, 27 Apr 2007 15:44:15 -0700 Subject: Has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:55:18
UPDATE