Cryptographic hash function

Results: 1121



#Item
821Electronic commerce / Key management / Hashing / Key size / SHA-1 / SHA-2 / RSA / Collision attack / NIST hash function competition / Cryptography / Cryptographic hash functions / Public-key cryptography

Microsoft PowerPoint - preneel_closing_isse12v4.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2013-10-24 09:07:43
822COSIC / Bart Preneel / Py / RC4 / MESH / RIPEMD / NESSIE / One-way compression function / Len Sassaman / Cryptography / Stream ciphers / Cryptographic hash functions

Publication List Bart PRENEEL Full professor KU Leuven

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2012-07-17 18:23:56
823Stream ciphers / Pseudorandomness / Search algorithms / Hashing / F-FCSR / Hash function / Cryptographic hash function / Feedback with Carry Shift Registers / Pseudorandom generator theorem / Cryptography / Theoretical computer science / Applied mathematics

Lightweight Sponge Stream F-FCSR f -function Analysis The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1

Add to Reading List

Source URL: www.aui.ma

Language: English - Date: 2012-07-13 06:37:48
824Error detection and correction / Information retrieval / Artificial intelligence / Information science / Cryptography / Hash function / Merkle–Damgård construction / Hash tree / Tabulation hashing / Hashing / Cryptographic hash functions / Search algorithms

Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
825Post-quantum cryptography / Hashing / Merkle signature scheme / Hash tree / Digital signature / SHA-2 / RSA / SHA-1 / Hash function / Cryptography / Cryptographic hash functions / Public-key cryptography

2006 IEEE 24th Convention of Electrical and Electronics Engineers in Israel One-Time Signatures Revisited: Practical Fast Signatures Using Fractal Merkle Tree Traversal Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: www.eng.tau.ac.il

Language: English - Date: 2006-11-22 02:16:55
826Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction

Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
827NIST hash function competition / Integrated circuits / Electronic design automation / Cryptographic hash functions / Electronic design / Application-specific integrated circuit / Keccak / Field-programmable gate array / Standard cell / Electronic engineering / Electronics / Cryptography

SHA-3 Conference, March 2012, Lessons Learned from Designing a 65 nm ASIC for Evaluating Third Round SHA-3 Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:01:30
828NESSIE / Nimbus / SOBER / Hierocrypt / SNOW / Cryptographic hash function / SAFER / LEVIATHAN / Grand Cru / Cryptography / Block ciphers / Stream ciphers

Project Number IST[removed]Project Title

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-19 17:39:27
829Keccak / RadioGatún / Joan Daemen / Block cipher / Hash function / Cryptography / Cryptographic hash functions / NIST hash function competition

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-05-28 00:25:06
830Cryptographic protocols / Key management / HMAC / Key derivation function / Cryptographic hash function / Transport Layer Security / Key / CMAC / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:44:46
UPDATE