Cryptographic hash functions

Results: 1068



#Item
251Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-02 17:52:59
252Advantage / Adversary model / Diffie–Hellman problem / Random oracle / Cryptography / Cryptographic protocols / Cryptographic hash functions

Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem Hai Huang and Zhenfu Cao Department of Computer Science and Engineering, Shanghai Jiaotong University, 800 Dongchuan Road,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 03:18:55
253Block cipher / Hash function / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Collision attack

A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-21 12:10:24
254Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 14:07:22
255Stream ciphers / Cryptographic hash functions / Advanced Encryption Standard / Hamming weight / Py / Lookup table / Cryptography / Keccak / NIST hash function competition

Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 21:07:24
256Hashing / NIST hash function competition / Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / Grøstl / VEST / Whirlpool / Cryptography / Cryptographic hash functions / GOST standards

STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 15:45:44
257Cryptographic hash functions / Electronic commerce / Certificate policy / SHA-1 / SHA-2 / Digital signature / Public key certificate / Digital Signature Algorithm / SHA / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - APTFF_KTNET_2011_Jay Kim.ppt [호환 모드]

Add to Reading List

Source URL: unnext.unescap.org

Language: English
258MD4 / MD5 / RIPEMD / Hans Dobbertin / HAVAL / SHA-1 / Comparison of cryptographic hash functions / Hash function / Collision / Cryptography / Cryptographic hash functions / Hashing

Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang1, Dengguo Feng2, Xuejia Lai3, Hongbo Yu1

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2004-08-18 20:15:31
259Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
260Search algorithms / Error detection and correction / MD5 / Collision resistance / Hash function / SHA-1 / Birthday attack / Collision / Quadratic probing / Cryptographic hash functions / Cryptography / Hashing

Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:24:55
UPDATE