Cryptographic hash functions

Results: 1068



#Item
191Cryptographic protocols / Hashing / Replay attack / Security token / RSA / SHA-1 / Trusted timestamping / Interlock protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Automatic Event-Stream Notarization Using Digital Signatures Bruce Schneier John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
192Software / Bitcoin / Peer-to-peer computing / Financial cryptography / Electronic commerce / Proof-of-work system / Peer-to-peer / Public-key cryptography / Electronic money / Computing / Cryptography / Cryptographic hash functions

Permacoin: Repurposing Bitcoin Work for Data Preservation Andrew Miller1 , Ari Juels, Elaine Shi1 , Bryan Parno2 and Jonathan Katz1 1 University of Maryland 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-05-29 22:16:19
193Search algorithms / Computer performance / Software optimization / Cryptographic hash functions / Error detection and correction / Hash function / Trie / SHA-1 / Algorithm / Computing / Statistics / Computer programming

HyperLogLog in Practice: Algorithmic Engineering of a State of The Art Cardinality Estimation Algorithm Stefan Heule Marc Nunkesser

Add to Reading List

Source URL: stefanheule.com

Language: English - Date: 2015-01-15 03:04:25
194Password / Cryptographic software / S/KEY / One-time password / Cryptographic hash functions / Password strength / Random password generator / Cryptography / Security / Computer security

Functional Programming and Specification Practical 1 This practical exercise is to be completed by 4pm on Tuesday 8th February. It will be marked but the mark will not contribute to the overall mark for the course. Pleas

Add to Reading List

Source URL: homepages.inf.ed.ac.uk

Language: English - Date: 2011-02-04 03:56:19
195ICE / International Data Encryption Algorithm / Cryptographic hash functions / GOST / KASUMI / Cryptography / Block ciphers / Akelarre

Cryptanalysis of Akelarre Niels Ferguson Bruce Schneier DigiCash bv Counterpane Systems Kruislaan 419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
196Cryptographic hash function / Information retrieval / Information science / Artificial intelligence / Hash / Hash functions / Hash table / Bloom filter / Hashing / Search algorithms / Error detection and correction

Perl versiondocumentation - Hash::Util NAME Hash::Util - A selection of general-utility hash subroutines SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 14:56:23
197Preimage attack / MD5 / SHA-2 / Hash function / SHA-1 / Hash table / Collision attack / Padding / Tiger / Cryptographic hash functions / Cryptography / Error detection and correction

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2 1 National Institute of Standards and Technology,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
198SHACAL / NIST hash function competition / Ciphertext / SHA-1 / Boomerang attack / Cryptography / Cryptographic hash functions / Block cipher

improved_analysis_of_Shamata-BC.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 03:59:47
199Software engineering / SHA-2 / Checksum / SHA-1 / Perl / Computing / Cryptographic hash functions / Computer programming

Perl versiondocumentation - shasum NAME shasum - Print or Check SHA Checksums SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:57:42
200Computing / Disk encryption / Hashing / Search algorithms / Crypt / MD5 / Payment Card Industry Data Security Standard / Tokenization / Hash function / Cryptography / Cryptographic hash functions / Computer security

PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2015-02-18 09:34:54
UPDATE