Cryptographic hash function

Results: 1121



#Item
911One-way compression function / Merkle–Damgård construction / Random oracle / Universal one-way hash function / Collision resistance / Hash function / Collision / Birthday attack / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
912Information science / Artificial intelligence / Hash function / Collision detection / Hash table / Cryptographic hash function / Collision / Hashing / Search algorithms / Information retrieval

Optimized Spatial Hashing for Collision Detection of Deformable Objects Matthias Teschner

Add to Reading List

Source URL: www.beosil.com

Language: English - Date: 2007-06-01 11:41:36
913Cryptographic hash function / Hash tree / Digital signature / Collision resistance / Hash function / Lamport signature / One-way compression function / Cryptography / Preimage attack / Merkle signature scheme

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-04-11 11:06:58
914Cryptographic hash functions / Microsoft App-V / Hash tree / Hash function / Computing / Computer memory / Information / Data / Error detection and correction / Cache / Hashing

Missive: Fast Appliance Launch From an Untrusted Buffer Cache Jon Howell, Jeremy Elson, Bryan Parno, John R. Douceur Microsoft Research, Redmond, WA

Add to Reading List

Source URL: 131.107.65.14

Language: English - Date: 2013-01-31 17:33:54
915Keccak / NIST hash function competition / RadioGatún / Joan Daemen / SHA-1 / SHA-2 / National Security Agency / Hash function / Cryptographic hash functions / Error detection and correction / Cryptography

Keccak and the SHA-3 Standardization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-11 13:30:30
916Hashing / Key / Symmetric-key algorithm / Block cipher / Cipher / HMAC / Cryptographic hash function / Stream cipher / Advanced Encryption Standard / Cryptography / Key management / Message authentication codes

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
917Electronic commerce / RSA / Digital signature / Random oracle / Provably secure cryptographic hash function / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic hash functions

ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-07-13 05:54:26
918Key management / HMAC / Cryptographic hash function / Key / CMAC / SHA-2 / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
919Information science / Information retrieval / Perfect hash function / Hash function / Hash table / Cryptographic hash function / Trie / Lookup table / Open addressing / Hashing / Search algorithms / Computing

GPERF A Perfect Hash Function Generator Douglas C. Schmidt

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 1998-09-24 17:38:34
920Computer programming / Information retrieval / Trie / Radix tree / Hash function / Perfect hash function / Bit array / Cryptographic hash function / FO / Hashing / Search algorithms / Computing

Theory and Practise of Monotone Minimal Perfect Hashing Djamal Belazzougui∗

Add to Reading List

Source URL: www.siam.org

Language: English - Date: 2010-03-18 09:59:10
UPDATE