Cryptographic hash function

Results: 1121



#Item
561Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction

Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:54:18
562NIST hash function competition / Cyberwarfare / Applied mathematics / Cryptography / Cryptographic hash functions / Hashing

Proposed Timeline for the Development of New Hash Functions Elaine Barker NIST [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:00:44
563Collision attack / SHA-2 / MD5 / Hash function / MD4 / RSA / Provably secure cryptographic hash function / One-way compression function / Cryptography / Cryptographic hash functions / SHA-1

C:uments and SettingsydloDocumentsPCTeX Files1padpp-yinszydlosept21.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:20:00
564Internet protocols / FIPS 140-2 / FIPS 140 / Internet Key Exchange / IPsec / Critical Security Parameter / Zeroisation / Key management / Cryptographic hash function / Cryptography / Cryptographic protocols / Cryptography standards

SCO CMW Security Policy[removed]PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
565Hashing / Search algorithms / Collision attack / Hash function / SHA-1 / Merkle–Damgård construction / MD4 / Steganography / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Using Steganography to Improve Hash Functions’ Collision Resistance Emmanouel Kellinis1 and Konstantinos Papapanagiotou2 1 KPMG LLP, One Canada Square, London E14 5AG, United Kingdom [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:05:58
566Eli Biham / NESSIE / Symmetric-key algorithm / Serpent / Cryptographic hash function / Boomerang attack / Advanced Encryption Standard / Cryptanalysis / KASUMI / Cryptography / Block ciphers / SHACAL

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:23:24
567Merkle–Damgård construction / Probability theory / Random oracle / Hash function / HMAC / Oracle machine / Collision resistance / Random function / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

Merkle Damgard Revisited: how to Construct a hash Function Jean-Sebastien Coron Yevgeniy Dodis Cecile Malinaud

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
568Hashing / HAVAL / Signcryption / PKC / Cryptographic hash function / Cryptography / Year of birth missing / Yuliang Zheng

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:29:14
569Hash function / MD5 / MD4 / N-Hash / Lattice problem / NIST hash function competition / Trie / SHA-2 / Collision resistance / Cryptographic hash functions / Cryptography / SHA-1

Cryptographic Hash Workshop[removed]LASH

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:05:04
570PBKDF2 / HMAC / FIPS 140 / Key generation / Cryptographic hash function / SHA-1 / Critical Security Parameter / PKCS / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

FSCLM PPC Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE