Cryptographic hash functions

Results: 1068



#Item
171Pseudorandomness / Computational complexity theory / Randomness / Hashing / Pseudorandom generator theorem / Pseudorandom generator / One-way function / Hard-core predicate / Cryptographic hash function / Cryptography / Theoretical computer science / Applied mathematics

Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-10 11:39:44
172MD2 / SHA-2 / SHA-1 / Computer programming / Md5sum / Software / Binary file / Crypt / Cryptographic hash functions / Computing / MD5

Perl versiondocumentation - Digest::file NAME Digest::file - Calculate digests of files SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:24:19
173Computing / Cryptographic hash functions / Hashing / SHA-2 / Internet protocols / HMAC / Bouncy Castle / SHA-1 / IPsec / Cryptography / Error detection and correction / Cryptographic software

Bouncy Castle FIPS Java API 1 MayIntroduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-05-08 17:24:41
174Internet protocols / Password / Challenge-response authentication / Inter-Asterisk eXchange / MD5 / Replay attack / Man-in-the-middle attack / Computer network security / Cryptographic hash functions / Computer security / Cryptography / Cyberwarfare

iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
175Hash function / Cryptographic hash functions / Information retrieval / Artificial intelligence / Cyberwarfare / Cryptography / Hashing / Error detection and correction

COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:42
176System software / Cryptographic software / Secure Shell / Telnet / SHA-2 / SHA-1 / Cryptographic hash functions / Computing / Internet

Release Notes - Version

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2014-11-17 16:33:02
177Cryptographic hash functions / Error detection and correction / File sharing networks / Computer programming / Hash tree / Distributed hash table / Kademlia / Hash list / BitTorrent / Distributed data storage / Hashing / Computing

IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet ABSTRACT

Add to Reading List

Source URL: static.benet.ai

Language: English - Date: 2014-07-24 07:13:01
178Cryptographic hash functions / Hashing / Internet standards / Email / MD5 / Crypt / SHA-2 / MD4 / HMAC / Error detection and correction / Computing / Cryptography

Perl versiondocumentation - Digest NAME Digest - Modules that calculate message digests SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:56:11
179Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 17:02:16
180Hash table / Hash list / Information retrieval / Artificial intelligence / Information science / Cryptographic hash functions / Hashing / Error detection and correction

Overview of NFD Beichuan Zhang The University Of Arizona What is NFD

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:48:25
UPDATE