Cryptographic hash function

Results: 1121



#Item
681Stream cipher / Cryptographic hash function / Pseudorandom number generator / Block cipher / Symmetric-key algorithm / Cipher / Key size / Outline of cryptography / Index of cryptography articles / Cryptography / CRYPTREC / MUGI

Report on FY2001 Evaluation of Symmetric-Key Cryptographic Techniques April 16, 2002 Toshinobu Kaneko Chair, Symmetric-Key Cryptography Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
682MULTI-S01 / CRYPTREC / Block cipher modes of operation / Symmetric-key algorithm / Cryptographic hash function / Cipher / Index of cryptography articles / Outline of cryptography / Cryptography / Stream ciphers / Finite fields

Report on Present State of MULTI-S01 Cipher Evaluation (full evaluation) January 28, 2002 Takeshi Shimoyama,Yukiyasu Tsunoo, Kiyomichi Araki, Members

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
683Computing / Information / Data / Oram / CPU cache / Hash list / Hash tree / Hash function / Trie / Hashing / Error detection and correction / Cryptographic hash functions

1 Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.edu

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-08-04 20:04:19
684MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands [removed] January 29, 2012

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2012-01-29 17:12:55
685CRYPTREC / NESSIE / Cryptosystem / Hierocrypt / SC2000 / Cryptographic hash function / CIPHERUNICORN-A / CIPHERUNICORN-E / Symmetric-key algorithm / Cryptography / Cryptography standards / Block ciphers

CRYPTREC[removed]CRYPTREC Report[removed]Provisional Translation) March 2001

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:25
686Cache / Bloom filter / Information science / Information / Hash function / CPU cache / Trie / Cryptographic hash function / Cache algorithms / Hashing / Computing / Search algorithms

Bloom Filters in HBase Things you can toggle · HColumnDescriptor.setBloomFilterType(NONE | ROW | ROWCOL) to enable blooms per Column Family. Default = NONE ·

Add to Reading List

Source URL: issues.apache.org

Language: English
687Internet / Cryptographic protocols / Public-key cryptography / Internet standards / HTTP / Network Time Protocol / Cryptographic hash function / HTTP cookie / X.509 / Cryptography / Computing / Internet protocols

Microsoft PowerPoint - secproto.ppt

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-10-31 14:46:23
688NESSIE / Block cipher / Symmetric-key algorithm / Cryptographic hash function / Outline of cryptography / Cryptography / Cryptography standards / CRYPTREC

Overview of CRYPTREC Activities January 28, 2002 Hideki Imai, Professor, University of Tokyo, CRYPTREC Advisory Committee Chair, CRYPTREC Evaluation Committee Chair

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
689Hashing / MD4 / Bart Preneel / Preimage attack / Hash list / Hash function / RIPEMD / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-08-19 15:26:30
690Information retrieval / Information science / Error detection and correction / Hash table / Hash function / Cryptographic hash functions / Hash list / Trie / Hash / Hashing / Search algorithms / Computing

PDF Document

Add to Reading List

Source URL: www2.sas.com

Language: English - Date: 2006-03-01 09:39:45
UPDATE