Cryptographic hash function

Results: 1121



#Item
531Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:36
532Hashing / Crypt / Hash function / SHA-2 / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Fri, 13 Apr 2007 15:43:28 +0300 From: Carmi Gressel Subject: Hash Algorithm Requirements and Evaluation Criteria To: william.burr@nist.gov, hash-function@nist.gov X-Mai

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:27:14
533Electronic commerce / Hashing / Computational complexity theory / Search algorithms / RSA / Cryptographic hash function / Communication complexity / Hash function / Homomorphic encryption / Cryptography / Theoretical computer science / Applied mathematics

On the Communication Complexity of Secure Function Evaluation with Long Output Pavel Hub´aˇcek∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 12:48:08
534Computer-mediated communication / Cryptographic hash function / MD5 / LISTSERV / SHA-2 / Digital preservation / Checksum / Records management / H-Net / Computing / Email / Internet

H-Net Preservation Improvements

Add to Reading List

Source URL: www.h-net.org

Language: English - Date: 2008-08-18 14:18:35
535Error detection and correction / Data quality / Hash function / Digital continuity / Digital preservation / Crypt / Digital signature / Fingerprint / Hash list / Cryptography / Hashing / Cryptographic hash functions

Microsoft Word - DigitalContinuityHandout_NAGARA Judicial Records Forum

Add to Reading List

Source URL: nagara.org

Language: English - Date: 2014-06-06 16:31:44
536Error detection and correction / Search algorithms / Hash chain / Lamport signature / Hash function / Password / Hash tree / Hash / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new ideas for decre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 05:03:49
537Hashing / Merkle–Damgård construction / Hash function / Collision resistance / Crypt / Block cipher / Information retrieval / Computing / Artificial intelligence / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Tue, 13 Mar 2007 01:50:24 +0100 (CET) From: Orr Dunkelman To: hash-function@nist.gov Subject: A comment to NIST regarding the Hash function Competition X-Viru

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:52
538Computing / Skype security / Skype protocol / RC4 / CryptGenRandom / Cryptographic hash function / Password / Key / Peer-to-peer / Software / Cryptography / Skype

1 SKYPE SECURITY EVALUATION Tom Berson Anagram Laboratories 18 October 2005

Add to Reading List

Source URL: download.skype.com

Language: English - Date: 2010-07-12 07:17:40
539Hashing / SHA-2 / SHA-1 / Search algorithms / Crypt / Secure Hash Standard / NIST hash function competition / Collision attack / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

[Federal Register: September 12, 1997 (Volume 62, Number 177)]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:13:28
540Keccak / Hashing / Block ciphers / Joan Daemen / Threefish / Skein / Fugue / Bart Preneel / Crypt / Cryptography / NIST hash function competition / Cryptographic hash functions

The Second SHA-3 Candidate Conference Accepted Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:50:30
UPDATE