Cryptographic hash function

Results: 1121



#Item
951One-way compression function / Feistel cipher / CAST-128 / Cryptographic hash functions

The CAST-256 Encryption Algorithm Carlisle Adams CAST-256 is a symmetric cipher designed in accordance with the CAST design

Add to Reading List

Source URL: www.mavi1.org

Language: English - Date: 2012-11-07 04:01:25
952Hashing / Hash function / Artificial intelligence / Information retrieval / Searching / Cryptographic hash functions / Error detection and correction / Cryptography

Observations on H-PRESENT-128 Niels Ferguson Microsoft

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-08-17 15:01:29
953Symmetric-key algorithm / Block cipher / Camellia / Cryptographic hash function / Cipher / Cryptographic primitive / ESTREAM / Outline of cryptography / Crypto++ / Cryptography / Advanced Encryption Standard / Stream ciphers

Lightweight Cryptography for the Internet of Things Masanobu Katagi and Shiho Moriai Sony Corporation

Add to Reading List

Source URL: www.iab.org

Language: English - Date: 2011-03-25 11:03:50
954Key management / Cryptographic hash function / PKCS / Digital signature / Symmetric-key algorithm / Public key infrastructure / Block cipher / Microsoft CryptoAPI / Information security / Cryptography / Public-key cryptography / Message authentication codes

A Companion to User’s Guide to Cryptography and Standards Alexander W. Dent

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-03-20 11:00:00
955PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

ECRYPT II  

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-30 12:10:14
956Search algorithms / Cryptographic hash functions / EMC Corporation / SecurID / Hash function / Hash list / Hashing / Error detection and correction / Cryptography

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yinini

Add to Reading List

Source URL: www.crypto-world.com

- Date: 2011-04-01 07:21:47
957Side channel attack / FIPS 140-2 / Advanced Encryption Standard / Timing attack / FIPS 140 / Cryptographic hash function / Cryptanalysis / Differential fault analysis / Block cipher / Cryptography / Cryptography standards / Power analysis

Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testingª

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-10-27 03:09:54
958Hashing / Information retrieval / Artificial intelligence / Error detection and correction / Hash function / Bloom filter / Hash table / One-way compression function / Cryptography / Search algorithms / Cryptographic hash functions

Space/Time Trade-offs in Hash Coding with Allowable Errors

Add to Reading List

Source URL: crystal.uta.edu

Language: English - Date: 2005-04-12 16:14:35
959Mathematics / Computing / Logarithms / Hashing / Error detection and correction / Hash table / Hash function / MD5 / Trie / Cryptography / Cryptographic hash functions / Search algorithms

Parallel Collision Search with Application to Hash Functions and Discrete Logarithms Paul C. van Oorschot and Michael J. Wiener

Add to Reading List

Source URL: www.certainkey.com

Language: English - Date: 2001-09-18 05:27:04
960Random oracle / Advantage / Padding / Stream cipher / Collision resistance / Hash function / Keccak / One-way compression function / Cryptography / Cryptographic hash functions / Block cipher

Cryptographic sponge functions Guido B

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
UPDATE