Cryptographic hash functions

Results: 1068



#Item
181Hashing / Cryptographic software / Advanced Encryption Standard / HMAC / SHA-2 / SHA-1 / FIPS 140-2 / FIPS 140 / Key size / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - SamsungCryptoAPI_SPv1.12

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 09:56:13
182Computer security / MD5 / Cryptographic hash functions / Search algorithms / Archive formats / Crypt / GNU Privacy Guard / Zip / MD4 / Cryptography / Computing / Hashing

Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2004-12-02 07:12:00
183Computing / Cryptography / Computer programming / B-tree / Search algorithms / Hash function / Bloom filter / MD5 / Binary tree / Hashing / Cryptographic hash functions / Error detection and correction

FastAD: An Authenticated Directory for Billions of Objects Paul T. Stanton, Benjamin McKeown, Randal Burns, Giuseppe Ateniese Department of Computer Science, Johns Hopkins University ABSTRACT We develop techniques that m

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-09-28 22:39:23
184Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
185Random oracle / Preimage attack / Hash function / MDC-2 / Merkle–Damgård construction / SHA-1 / Oracle machine / SHA-2 / Advantage / Cryptography / Cryptographic hash functions / One-way compression function

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52
186Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45
187Hashing / Symmetric-key algorithm / RC4 / RC5 / Block cipher / SHA-1 / Crypt / GOST / Cipher / Cryptography / Stream ciphers / Cryptographic hash function

Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:51
188Cryptography / Applied mathematics / Crypt / Field-programmable gate array / Key derivation function / Password / Salt / MD5 / SHA-2 / Cryptographic hash functions / Mathematics / Key management

PRINCE modern password guessing algorithm Why do we need a new attack-mode? FUTURE OF PASSWORD HASHES

Add to Reading List

Source URL: hashcat.net

Language: English - Date: 2014-12-08 07:12:08
189Cryptographic software / Hashing / Block cipher / SHA-1 / Cipher / Cryptographic primitive / Crypt / CRYPTREC / BeeCrypt / Cryptography / Advanced Encryption Standard / Cryptographic hash functions

Performance of Protocols (Extended Abstract) Michael Roe Centre for Communications Systems Research 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:55
190Error detection and correction / Information retrieval / Information science / Cryptographic hash functions / Hash function / Forwarding plane / Hash table / Traffic flow / Count-Min sketch / Hashing / Computing / Search algorithms

pics/optim-cmss-space-0.2-ss1.0.eps

Add to Reading List

Source URL: www-bcf.usc.edu

Language: English - Date: 2013-02-21 14:29:31
UPDATE