Cryptographic hash function

Results: 1121



#Item
881SHA-1 / Preimage attack / SHA-2 / MD5 / ICE / S-box / Hash function / Differential cryptanalysis / VEST / Cryptography / Error detection and correction / Cryptographic hash functions

Finding Collisions for Reduced Luffa-256 v2 Bart Preneel2 , Hirotaka Yoshida12 , and Dai Watanabe1 1

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2014-03-19 02:03:06
882NIST hash function competition / Hashing / Message authentication codes / Keccak / HMAC / Hash function / Crypt / ICE / VEST / Error detection and correction / Cryptography / Cryptographic hash functions

The K SHA-3 submission

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
883Key management / Payment systems / Bitcoin / Digital signature / Double-spending / URI scheme / Key / Electronic money / Cryptographic hash function / Cryptography / Financial cryptography / Public-key cryptography

Bachelor’s Thesis (UAS) Degree Program in Information Technology 2012

Add to Reading List

Source URL: publications.theseus.fi

Language: English - Date: 2013-08-22 06:32:44
884Computing / Error detection and correction / Search algorithms / Hash function / SHA-2 / Hash list / Hash table / Crypt / Rsync / Cryptographic hash functions / Cryptography / Hashing

digital investigation 3S[removed]S91–S97 available at www.sciencedirect.com

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-03-18 21:36:24
885PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II  

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:08:56
886MD4 / SHA-2 / SHA-1 / MD5 / Collision attack / MD2 / Collision resistance / One-way function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Preimage attack

MD4 is Not One-Way Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-11-30 19:44:46
887Computing / Merkle–Damgård construction / SIMD / Symmetry in mathematics / Symmetry / Hash function / Symmetric matrix / Block cipher / Cryptographic hash functions / Error detection and correction / Cryptography

Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-01 05:47:23
888SIMD / Block cipher / Hash function / NIST hash function competition / Merkle–Damgård construction / One-way compression function / Cryptographic hash functions / Cryptography / Computing

SHA-3 submission – Tweaked version: [removed]SIMD Is a Message Digest

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2010-02-23 10:07:00
889NIST hash function competition / Search algorithms / Hashing / ICE / Hash function / Keccak / BLAKE / Cryptography / Error detection and correction / Cryptographic hash functions

Hash Function Luffa Specification Ver[removed]Christophe De Canni`ere

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2014-02-05 22:04:49
890NIST hash function competition / Hashing / Fugue / Stream ciphers / Advanced Encryption Standard / Merkle–Damgård construction / VEST / Hash function / SHA-1 / Cryptographic hash functions / Cryptography / Error detection and correction

The Hash Function “Fugue” Shai Halevi

Add to Reading List

Source URL: researcher.watson.ibm.com

Language: English - Date: 2012-04-03 14:47:34
UPDATE