Cryptographic hash functions

Results: 1068



#Item
221Search algorithms / Error detection and correction / Preimage attack / Ciphertext indistinguishability / Advantage / Random oracle / Hash function / Cryptography / Cryptographic hash functions / Hashing

Properties of Cryptographic Hash Functions Michal Rjaˇsko Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava. E-mail: Abstract. Thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 05:01:45
222Computational complexity theory / Preimage attack / Basketball at the 2009 Summer Universiade / Cryptographic hash functions

On the Security of Hash Functions Employing Blockcipher Postprocessing Donghoon Chang1 , Mridul Nandi2 , and Moti Yung3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 07:46:56
223Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Crypt / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2008-01-11 06:10:48
224Block cipher / Hash function / Collision attack / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Error detection and correction

Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-24 08:27:19
225Search algorithms / One-way compression function / Merkle–Damgård construction / MD5 / Preimage attack / Hash function / Cryptography / Cryptographic hash functions / Hashing

Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei, Guozhu Feng , Li Chao , and RuiLin Li Department of Science, National University of Defense Technology,Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-11 22:39:37
226OSI protocols / Computing / Electronic engineering / Cryptographic hash functions / SHA-2 / Transmission Control Protocol

A Hardware Interface for Hashing Algorithms December 17, 2008 Zhimin Chen, Sergey Morozov, Patrick Schaumont Bradley Department of Electrical and Computer Engineering Virginia Tech

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 09:14:41
227Advanced Encryption Standard / Block cipher / Symmetric-key algorithm / Cryptanalysis / ICE / Blowfish / Cryptographic hash functions / Cryptography / Data Encryption Standard / Stream cipher

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and Macchetti in 2009

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-17 08:34:51
228SHA-1 / Preimage attack / SHA-2 / Differential cryptanalysis / RIPEMD / MD4 / Collision attack / MD5 / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-07 11:46:12
229Boomerang attack / SHA-1 / Blake / Differential cryptanalysis / SHA-2 / Boomerang / MD5 / Differential equation / Error detection and correction / Cryptography / Cryptographic hash functions

The Boomerang Attacks on BLAKE and BLAKE2 Yonglin Hao Department of Computer Science and Technology, Tsinghua Universtiy, Beijing, China Abstract. In this paper, we study the securit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 20:17:27
230Mathematics / Merkle–Damgård construction / Hash function / Preimage attack / MD5 / SHA-1 / SHA-2 / Entropy / Collision attack / Cryptography / Cryptographic hash functions / Error detection and correction

Active Domain Expansion for Narrow-pipe Hash Xigen Yao Wuxi Hengqi Electromechanical Device Co.Ltd.China email : November 30, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-11-29 17:20:16
UPDATE