Cryptographic hash functions

Results: 1068



#Item
11Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
12Cryptography / Cryptographic hash functions / Zero-knowledge proof / Function / Random oracle / Utility

Theory and Application of Extractable Functions A Dissertation Presented to the Faculty of the Graduate School of Yale University

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2009-07-02 20:00:57
13Mathematics / Search algorithms / Information retrieval / Information science / Hashing / Analysis of algorithms / Cryptographic hash functions / Computational complexity theory / Universal hashing / Hash function / Randomized algorithm / Subset sum problem

Space-Efficient Randomized Algorithms for K-SUM Joshua R. Wang Stanford University, Stanford CA 94305, USA

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2014-04-18 04:16:48
14Information retrieval / Hashing / Information science / Search algorithms / Universal hashing / Hash table / Hash function / Linear probing / Cuckoo hashing / Bloom filter / Cryptographic hash function / Randomness extractor

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream

Add to Reading List

Source URL: theoryofcomputing.org

Language: English - Date: 2014-11-14 13:01:16
15Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
16Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
17Cryptography / Cryptographic hash functions / Information theory / Secure multi-party computation / Transmission Control Protocol / Bandwidth / SHA-1 / Internet protocol suite / Computational complexity theory / Network performance

Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2011-09-10 05:30:51
18Cryptography / Message authentication codes / Cryptographic hash functions / Block cipher / PMAC / Universal hashing / Permutation

Appears in Advances in Cryptology – Eurocrypt ’02, Lecture Notes in Computer Science, Vol. ????, L. Knudsen, ed., Springer-Verlag. This is the full version. A Block-Cipher Mode of Operation for Parallelizable Message

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-02-15 21:53:00
19Cryptography / Public-key cryptography / Records management technology / Signature / Cryptographic hash functions / Error detection and correction / Hash function / Crypt / Electronic signature / Digital signature

eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
20Cryptography / Cryptographic hash functions / One-way compression function / Block cipher / SHA-1 / Hash function

An abridged version, reference [2], appears as Advances in Cryptology – CRYPTO ’02, Lecture Notes in Computer Science, Vol. ????, M. Yung, ed., Springer-Verlag. This is the full version. Black-Box Analysis of the Blo

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-06-04 14:04:18
UPDATE