Cryptographic hash functions

Results: 1068



#Item
151Crypt / SHA-1 / BATON / Key generation / Cryptographic software / NSA cryptography / SHA-2 / Cryptography / Key management / Cryptographic hash functions

MYK-85 Key Management Unit A complete, 32-bit RISC-based cryptographic processor with Baton, DES, and Triple DES in

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
152MD5 / Padding / SHA-1 / RSA / Abstract Syntax Notation One / Cryptography / Cryptographic hash functions / Public-key cryptography

TargetCollidingCertificatesTech

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-10-26 18:40:33
153PBKDF2 / Password / Salt / Crypt / LastPass Password Manager / SHA-2 / Bcrypt / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Cryptographic software

Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:18:45
154Hashing / MD5 / SHA-1 / MD4 / RIPEMD / Crypt / Padding / Digital signature / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Contents I Table of Contents Part I Introduction

Add to Reading List

Source URL: www.bytefusion.com

Language: English - Date: 2007-05-31 21:17:32
155Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
156Cyberwarfare / Rainbow table / Password / SHA-2 / Crypt / Password strength / LM hash / Cryptography / Cryptographic hash functions / Computer security

CIS 331 Introduction to Networks & Security February 6, 2014 Homework 2: Authentication

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
157Notary / Cryptographic hash functions / Digital signature / Public key certificate / SHA-1 / Cryptography / Public-key cryptography / Key management

Sadikhov Certification Digital Signature Verification 1. Open the certification pdf file with a related pdf opener such as adobe acrobat readerYou can find a digital signature at the bottom of the certification w

Add to Reading List

Source URL: www.sadikhov.com

Language: English - Date: 2010-08-09 21:13:00
158Hashing / MD5 / HMAC / Collision attack / SHA-2 / Padding / SHA-1 / Merkle–Damgård construction / Crypt / Error detection and correction / Cryptography / Cryptographic hash functions

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
159Search algorithms / Hashing / Preimage attack / Merkle–Damgård construction / Hash function / Alexander Sotirov / Cryptographic hash functions / Cryptography / MD5

MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-26 13:48:46
160MD5 / Hash function / Cryptographic hash functions / Public key certificate / Hash chain / Cryptography / Hashing / Search algorithms

PayWord and MicroMint: Two simple micropayment schemes Ronald L. Rivest∗ and Adi Shamir∗∗ April 27, 2001 ∗

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:54
UPDATE