Cryptographic hash function

Results: 1121



#Item
611Search algorithms / Error detection and correction / Collision attack / Merkle–Damgård construction / Preimage attack / Hash function / Digital signature / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Hashing

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
612Computing / Cryptographic hash functions / Information / Internet protocols / Internet standards / Hash tree / Hash list / Hash function / Transport Layer Security / Hashing / Error detection and correction / Cryptography

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
613Electronics / Mathematics / Bloom filter / Filter theory / Cryptographic hash functions / Hash function / MD5 / Filter / Electronic filter / Hashing / Cryptography / Search algorithms

An Examination of Bloom Filters and their Applications Jacob Honoroff March 16, 2006 Outline

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:09
614Preimage attack / NIST hash function competition / Hash function / Cryptography / Cryptographic hash functions / Hashing

outbind://31-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:15:46
615Hashing / System software / Search algorithms / Data synchronization / Rsync / MD5 / Hash function / Andrew Tridgell / Rolling hash / Error detection and correction / Computing / Cryptographic hash functions

ManTech International Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-01-16 06:23:00
616Daniel J. Bernstein / Cryptographic hash functions / NIST hash function competition / Hash function

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:47:18
617Advanced Encryption Standard / Tiny Encryption Algorithm / Differential cryptanalysis / Grøstl / Crypt / Collision attack / Threefish / Cryptography / Cryptographic hash functions / NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:26:50
618Hashing / NIST hash function competition / MD5 / Hash function / HMAC / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Competition - Round 2: Official Comments-BMW

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:12:20
619Public-key cryptography / One-way function / Trapdoor function / Password-authenticated key agreement / Random oracle / PP / NP / Oracle machine / RSA / Cryptography / Cryptographic protocols / Cryptographic hash functions

J. Cryptology[removed]OF1–OF35 DOI: [removed]s00145[removed] © 2006 International Association for Cryptologic Research Trapdoor Hard-to-Invert Group

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
620Collision / Hash function / Information retrieval / Artificial intelligence / Computing / Cryptographic hash functions / Hashing / Search algorithms

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:46:46
UPDATE