Cryptographic hash function

Results: 1121



#Item
901JH / Advanced Encryption Standard / Q / ICE / Cryptographic hash functions / Serpent / Grøstl / One-way compression function / Cryptography / NIST hash function competition / Block cipher

The Hash Function JH 1

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2012-07-05 12:19:19
902Grøstl / SHA-1 / Advanced Encryption Standard / SHA-2 / Tiger / MD5 / Hash function / Permutation / Block cipher / Error detection and correction / Cryptographic hash functions / Cryptography

Grøstl – a SHA-3 candidate ∗

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:38
903Error detection and correction / Preimage attack / Search algorithms / Hash function / Collision attack / Birthday attack / Hash tree / Padding / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damg˚ ard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-02-02 00:00:00
904Computer architecture / Cryptographic hash functions / Instruction set architectures / Keccak / Skein / SHA-1 / Fugue / SHA-2 / CPU cache / Error detection and correction / NIST hash function competition / Computing

SHA-3 Conference, August 2010, Comparative Performance Review of the SHA-3 Second-Round Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 13:39:10
905GOST standards / Grøstl / NIST hash function competition / GOST / Advanced Encryption Standard / Block cipher / MD5 / SHA-1 / Differential cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Integral Distinguishers for Reduced-round Stribog Riham AlTawy and Amr M. Youssef

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 15:56:16
906Grøstl / Differential cryptanalysis / Advanced Encryption Standard / Hash function / Block cipher / Cryptographic hash functions / Cryptography / NIST hash function competition / Error detection and correction

Updated Differential Analysis of Grøstl Martin Schl¨affer Institute for Applied Information Processing and Communications (IAIK)

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:06
907NIST hash function competition / Eli Biham / SHA-2 / SHA-1 / Preimage attack / MD5 / Advanced Encryption Standard / Keccak / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2010-08-24 17:09:24
908Preimage attack / Haifa / Hash function / Collision resistance / Merkle–Damgård construction / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

Merkle-Damg˚ ard

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: English - Date: 2011-05-16 11:44:04
909Hashing / Hash function / Preimage attack / Padding / SHA-2 / Collision attack / Merkle–Damgård construction / Collision resistance / One-way compression function / Cryptographic hash functions / Cryptography / Error detection and correction

A Framework for Iterative Hash Functions — HAIFA Eli Biham1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-08 13:12:03
910NIST hash function competition / Search algorithms / MD5 / BLAKE / Keccak / Hash function / Block cipher / Differential cryptanalysis / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Analysis of BLAKE2 Jian Guo1 , Pierre Karpman1,2 , Ivica Nikoli´c1 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-29 13:50:06
UPDATE