Cryptographic hash function

Results: 1121



#Item
891Hashing / NIST hash function competition / Preimage attack / SHA-1 / Keccak / Random oracle / Provable security / MD5 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
892Applied mathematics / Pseudorandom number generators / Cryptographic hash function / Pseudorandomness / Random number generation / National Security Agency / Block cipher / Entropy / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Information theory

NIST Special Publication[removed]Recommendation for Random

Add to Reading List

Source URL: llamasinmynetwork.com

Language: English - Date: 2013-08-01 17:03:41
893SHA-2 / SHA-1 / Preimage attack / Padding / Advanced Encryption Standard / NIST hash function competition / Block cipher / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

The SHAvite-3 Hash Function Tweaked Version[removed]

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2009-11-23 10:40:19
894Search algorithms / Error detection and correction / Preimage attack / One-way compression function / Collision resistance / Collision attack / One-way function / Hash function / Collision / Cryptography / Cryptographic hash functions / Hashing

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
895Hashing / Padding / NIST hash function competition / Hash function / Crypt / Advanced Encryption Standard / Collision resistance / Merkle–Damgård construction / HAS-V / Cryptography / Cryptographic hash functions / Error detection and correction

Orange Labs Issy-les-Moulineaux, France

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2010-08-14 12:14:45
896Security / Dual EC DRBG / National Institute of Standards and Technology / National Security Agency / National security / Hash function / Cryptographic hash function / HMAC / Cryptography / Hashing / Pseudorandom number generators

[removed]and Dual EC DRBG John Kelsey, NIST

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-12-25 17:11:15
897Search algorithms / Hashing / Preimage attack / MD5 / SHA-1 / Collision attack / Hash function / Hash table / MD4 / Cryptography / Cryptographic hash functions / Error detection and correction

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-29 10:08:07
898Cryptography / NIST hash function competition / SHA-2 / Hash function / SHA-1 / MD5 / Hash tree / Keccak / HMAC / Error detection and correction / Cryptographic hash functions / Hashing

BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1 , Samuel Neves2 , Zooko Wilcox-O’Hearn3 , and Christian Winnerlein4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-26 14:43:26
899NIST hash function competition / SHA-2 / Preimage attack / SHA-1 / MD5 / Skein / Threefish / MD4 / Rotational cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-07 10:17:20
900Finite fields / Phillip Rogaway / PMAC / Fast Software Encryption / Index of cryptography articles / DES-X / Cryptography / Message authentication codes / Cryptographic hash function

John R. Black, Jr. Department of Computer Science 430 UCB

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2013-07-25 13:12:31
UPDATE