Cryptographic hash function

Results: 1121



#Item
921Preimage attack / Collision attack / HMAC / SHA-2 / Hash function / SMASH / MD5 / SHA-1 / One-way function / Cryptographic hash functions / Cryptography / Error detection and correction

SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-05-26 16:47:31
922Block ciphers / Serpent / Preimage attack / Cryptography / Cryptographic hash functions / NIST hash function competition

The Hash Function Hamsi ¨ ul K¨ Ozg¨

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
923Cryptographic hash function / Block cipher / Password / Crypt / Key size / Key / Cipher / SHA-1 / Padding / Cryptography / Symmetric-key algorithm / Advanced Encryption Standard

maXbox Starter 13 Start with Crypto Programming 1.1 Set a Cipher

Add to Reading List

Source URL: www.softwareschule.ch

Language: English - Date: 2012-01-20 05:07:53
924Information retrieval / Error detection and correction / Information / Hash table / Hash function / Trie / Extendible hashing / Cryptographic hash function / B-tree / Information science / Search algorithms / Hashing

Extendible Hashing-A Fast Access Method for Dynamic Files

Add to Reading List

Source URL: www.informatik.uni-jena.de

Language: English - Date: 2005-11-08 01:51:24
925Federal Depository Library Program / Digital libraries / Preservation / United States Government Printing Office / Authentication / Cryptographic hash function / Federal Digital System / Federal Register / Metadata / Cryptography / Notary / Electronic documents

Authenticity of Electronic Federal Government Publications __________________________________________________________________

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-06-15 07:11:55
926NLFSR / Linear feedback shift register / Cryptographic hash function / Q / S-box / A5/1 / Grain / T-function / Cryptography / Stream ciphers / VEST

VEST Hardware-Dedicated Stream Ciphers (eSTREAM Round 1 Submission, Revised)

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2005-10-31 03:26:50
927Search algorithms / Error detection and correction / Pseudorandom function family / Hash function / Random oracle / Optimal asymmetric encryption padding / Feistel cipher / Collision resistance / Advantage / Cryptography / Cryptographic hash functions / Hashing

A preliminary version appears at ICALP, Lecture Notes in Computer Science, Springer-Verlag, [removed]Robust Multi-Property

Add to Reading List

Source URL: homepages.cwi.nl

Language: English - Date: 2008-08-14 09:00:13
928Spam filtering / Email / Computer-mediated communication / Anti-spam techniques / Spam / Email spam / Hash buster / Cryptographic hash function / Hash function / Spamming / Internet / Computing

An Open Digest-based Technique for Spam Detection∗ E. Damiani1 , S. De Capitani di Vimercati1 , S. Paraboschi2 , P. Samarati1 (1) DTI - Universit`

Add to Reading List

Source URL: spdp.di.unimi.it

Language: English - Date: 2012-12-10 09:50:03
929JH / Advanced Encryption Standard / Q / ICE / Cryptographic hash functions / Serpent / Grøstl / One-way compression function / Cryptography / NIST hash function competition / Block cipher

The Hash Function JH 1

Add to Reading List

Source URL: www3.ntu.edu.sg

Language: English - Date: 2011-01-18 19:17:26
930Rainbow table / Key management / Password / Dictionary attack / Salt / Key derivation function / Random password generator / Key space / John the Ripper / Cryptography / Espionage / Cryptographic hash functions

Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff Arvind Narayanan and Vitaly Shmatikov

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2005-09-13 00:37:50
UPDATE