Cryptographic hash functions

Results: 1068



#Item
241One-way function / Pseudorandom generator theorem / Hard-core predicate / Random oracle / Verifiable random function / Trapdoor function / Pseudorandom function family / Pseudorandom generator / Pseudorandom permutation / Cryptography / Pseudorandomness / Cryptographic hash functions

Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations? Dario Fiore1 and Dominique Schr¨oder2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 13:18:51
242Peer-to-peer computing / Concurrent computing / Transaction processing / Cryptographic hash functions / Error detection and correction / Hashing / Computing / Software / Bitcoin

Accelerating Bitcoin’s Transaction Processing Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky∗ Aviv Zohar†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-31 04:08:51
243SHA-1 / MD4 / MD5 / Differential cryptanalysis / RIPEMD / Hamming weight / A5/1 / ICE / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-19 18:19:12
244Optimal asymmetric encryption padding / Claw-free permutation / Combinatorics / One-way function / Advantage / Random oracle / Parity of a permutation / Trapdoor function / Full Domain Hash / Cryptography / Permutations / Cryptographic hash functions

On the Impossibility of Instantiating PSS in the Standard Model Rishiraj Bhattacharyya1 and Avradip Mandal2 1 Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-21 12:09:46
245Cryptographic hash functions / Cross-platform software / Advanced Encryption Standard / Reconfigurable video coding / Programming paradigms / Dataflow programming / SHA-2 / AES implementations / SHA-1 / Computing / Electronic engineering / Hardware description languages

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (Extended Edition)? Junaid Jameel Ahmad1 , Shujun Li1,2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-21 10:33:05
246Introductory physics / Mechanics / Cryptographic hash functions / Collision / AES implementations / Nonlinear system / Cryptography / Advanced Encryption Standard / Physics

Algebraic Side-Channel Collision Attacks on AES Andrey Bogdanov1 and Andrey Pyshkin2 1 Chair for Communication Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-20 06:12:45
247Function / Preimage attack / Image / Inverse function / Valuation / GOST / Mathematics / Cryptography / Cryptographic hash functions

Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-22 12:08:36
248SHA-2 / Computing / Computer programming / Mathematics / Cryptographic hash functions / Hash function / SHA-1

Data-Depend Hash Algorithm ZiJie Xu and Ke Xu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-03-29 20:31:43
249Cryptographic hash functions / Computer security / Hash tree / Peer-to-peer / Trusted timestamping / Hash function / Digital signature / Hash list / Linked timestamping / Cryptography / Hashing / Error detection and correction

Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1,2 , Andres Kroonmaa1 , and Risto Laanoja1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 18:39:49
250Electronic commerce / MD5 / Hashing / Collision attack / X.509 / SHA-1 / Padding / Collision / Preimage attack / Cryptography / Public-key cryptography / Cryptographic hash functions

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities version 1.1, 4th November 2006 Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-05 01:53:21
UPDATE