Cryptographic hash function

Results: 1121



#Item
871Advanced Encryption Standard / Message authentication codes / Hashing / SecurID / ICE / VEST / Hash function / Lookup table / Hamming weight / Cryptography / Cryptographic hash functions / Stream ciphers

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yin2 1 Macquarie University, Computing Department, NSW 2109 Australia, [removed],

Add to Reading List

Source URL: www.crypto-world.com

Language: English - Date: 2011-04-01 07:21:08
872Internet / Cryptographic protocols / Public-key cryptography / Internet standards / HTTP / Network Time Protocol / Cryptographic hash function / HTTP cookie / X.509 / Cryptography / Computing / Internet protocols

Microsoft PowerPoint - secproto.ppt

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-10-31 14:46:23
873Cryptographic hash functions / Hash House Harriers / Hash function / Hash list / Hash / Information retrieval / Artificial intelligence / Human behavior / Error detection and correction / Hashing / Search algorithms

Singapore Hash House Harriets 2000th Run 22nd October 2011 The Grand Mattress... Dear Hashers,

Add to Reading List

Source URL: www.singaporeharriets.com

Language: English - Date: 2011-10-31 01:54:49
874Science / Data / Data warehouse / Information technology management / Data sharing / Database / Hash function / Cryptographic hash function / Clinical data management / Data management / Business intelligence / Information

Redactable and Auditable Data Access for Bioinformatics Research Jordan Brown*; Mustaque Ahamad†, PhD; Musheer Ahmed†; Douglas M. Blough*, PhD; Tahsin Kurc††, PhD; Andrew Post††, MD, PhD; and Joel Saltz††

Add to Reading List

Source URL: www.ncbi.nlm.nih.gov

Language: English
875Information science / Information retrieval / Cryptographic hash functions / Information / Hash function / Record linkage / Health informatics / National Institute of Environmental Health Sciences / Hash list / Hashing / Error detection and correction / Search algorithms

Anonymous Record Linkage Between EPR and CDW-H: Toward Development of a Federated Genotype-Phenotype System Dongqiuye Pu, M.S.1,2, Stavros Garantziotis, M.D.3, Javed Mostafa, Ph.D.1,2

Add to Reading List

Source URL: www.ncbi.nlm.nih.gov

Language: English
876Search algorithms / Preimage attack / Error detection and correction / Universal one-way hash function / Collision resistance / HMAC / Hash function / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:12:02
877Hashing / SHA-2 / SHA-1 / Keccak / NIST hash function competition / Secure Hash Standard / Crypt / Hash function / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-09 12:06:39
878One-way function / Digital signature / MD5 / Provably secure cryptographic hash function / Cryptography / Cryptographic hash function / Hash function

Pricing via Processing or Combatting Junk Mail∗

Add to Reading List

Source URL: web.cs.dal.ca

Language: English - Date: 2009-06-17 14:01:01
879Preimage attack / Keccak / SHA-2 / Crypt / NIST hash function competition / Hash function / Lamport signature / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-05 14:22:31
880Cryptographic hash functions / SHA-1 / Keccak / Skein / BLAKE / Secure Hash Standard / CubeHash / Vlastimil Klíma / SIMD / NIST hash function competition / Error detection and correction / Cryptography

NISTIR 7764, Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-03-01 16:20:57
UPDATE