Cryptographic hash function

Results: 1121



#Item
931Hashing / Preimage attack / SHA-1 / MD5 / NIST hash function competition / Collision resistance / Crypt / HMAC / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

The Hitchhiker's Guide to the SHA-3 Competition

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2012-07-04 01:21:00
932Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2009-08-26 20:14:40
933Password / Rainbow table / Salt / One-time password / Cryptographic hash function / Crypt / Security token / Passphrase / Two-factor authentication / Security / Computer security / Cryptography

K:Journal ปีที่ 8 เล่มที่ 2

Add to Reading List

Source URL: suanpalm3.kmutnb.ac.th

Language: English - Date: 2013-01-28 01:59:46
934Hashing / NIST hash function competition / Message authentication codes / MD6 / Collision resistance / HMAC / Preimage attack / Hash function / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-10-27 11:58:57
935MD5 / MD4 / Collision attack / Venti / RIPEMD / Hash function / Wang Xiaoyun / SHA-2 / Cryptographic hash functions / Cryptography / SHA-1

Finding Collisions in the Full SHA-1 Xiaoyun Wang1, , Yiqun Lisa Yin2 , and Hongbo Yu3 1

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:28
936MD4 / MD5 / RIPEMD / Hans Dobbertin / HAVAL / SHA-1 / Comparison of cryptographic hash functions / Hash function / Collision / Cryptography / Cryptographic hash functions / Hashing

Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang1,

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:27
937Error detection and correction / Key management / Merkle signature scheme / Cryptographic hash function / Digital signature / Hash tree / Key generation / Cryptographically secure pseudorandom number generator / Trie / Cryptography / Public-key cryptography / Hashing

Merkle Signatures with Virtually Unlimited Signature Capacity Johannes Buchmann1 , Erik Dahmen1 , Elena Klintsevich1 ,

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2007-07-10 07:26:05
938Post-quantum cryptography / Merkle signature scheme / Hashing / Digital signature / Cryptographic hash function / Digital Signature Algorithm / Elliptic Curve DSA / RSA / Hash function / Cryptography / Public-key cryptography / Key management

CMSS – An Improved Merkle Signature Scheme Johannes Buchmann1 , Luis Carlos Coronado Garc´ıa2 , Erik Dahmen1 , Martin D¨

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2006-10-23 05:39:57
939Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
940/dev/random / Random number generation / Cryptographic hash function / Entropy / Padding / Fortuna / Pseudorandomness / Key / MD5 / Cryptography / Randomness / Pseudorandom number generators

Software Generation of Practically Strong Random Numbers Peter Gutmann Department of Computer Science

Add to Reading List

Source URL: www.cs.auckland.ac.nz

Language: English - Date: 1998-02-12 15:33:43
UPDATE