Cryptographic hash function

Results: 1121



#Item
541Hash function / Collision attack / Birthday attack / Collision / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Preimage attack

Multicollision Attacks on Some Generalized Sequential Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:57:26
542Message authentication codes / HMAC / Internet protocols / Cryptographic hash functions / Cryptographic protocols / Collision attack / MD4 / MD5 / SHA-1 / Cryptography / Error detection and correction / Hashing

Forgery and Partial Key Recovery attacks on HMAC and NMAC using Hash Collisions 2nd NIST Hash Function Workshop Scott Contini Macquarie University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:27:16
543Cryptographic hash functions / Block ciphers / Advanced Encryption Standard / Keccak / Threefish / Skein / Joan Daemen / Grøstl / Crypt / Cryptography / NIST hash function competition / Error detection and correction

The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available. First Day

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 14:27:39
544Hashing / Hash function / Merkle–Damgård construction / Information retrieval / Artificial intelligence / Applied mathematics / Provably secure cryptographic hash function / Collision resistance / Cryptographic hash functions / Cryptography / Search algorithms

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:57:42
545Universal one-way hash function / SHA-1 / SHA-2 / Hash function / Hash list / Cryptographic primitive / Collision / MD5 / One-way function / Cryptographic hash functions / Error detection and correction / Cryptography

1 Q2S Edon-R, An Infinite Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:38:20
546SHA-1 / SHA-2 / Merkle–Damgård construction / Hash function / Crypt / Provably secure cryptographic hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:52:44
547Collision resistance / Mathematics / Hash function / SWIFFT / Applied mathematics / Fast Fourier transform / Cyberwarfare / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Digital signal processing

Provably Secure FFT Hashing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:50:36
548SHA-1 / SHA-2 / Hash list / Hash function / Merkle–Damgård construction / Crypt / MD5 / NIST hash function competition / RIPEMD / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft Word - Workshop 2 proposal.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:53:44
549Cryptographic hash function / Advanced Encryption Standard / FIPS 140-2 / Transport Layer Security / FIPS 140 / National Security Agency / Authentication / Cryptography / Security / Cryptography standards

State of California Office of Administrative Law

Add to Reading List

Source URL: oag.ca.gov

Language: English - Date: 2014-08-13 19:18:03
550Cryptographic hash functions / NIST hash function competition / Electronic submission

This workshop considers the full range of public key technology used for security decisions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:57:34
UPDATE