Cryptographic hash functions

Results: 1068



#Item
291Computing / SHA-2 / London / W postcode area / Bitcoin / Cryptographic nonce / Crypt / Hash function / Cryptography / Cryptographic hash functions / Software

GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BITCOIN MINING MACHINES Javed Barkatullah, Ph.D., MBA Timo Hanke, Ph.D.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-12 14:05:46
292Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
293Collision attack / Preimage attack / Spectral Hash / Hash function / Collision / NIST hash function competition / Oracle machine / Cryptography / Cryptographic hash functions / Random oracle

Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
294Cryptographic software / Computer law / Password cracking / Password / Rainbow table / Salt / Key stretching / Crypt / Bcrypt / Cryptography / Cryptographic hash functions / Key management

Password Hashing Competition - Survey and Benchmark George Hatzivasilis1 , Ioannis Papaefstathiou1 , and Charalampos Manifavas2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-22 05:43:55
295MD4 / SHA-2 / SHA-1 / RIPEMD / MD5 / Hash function / Keccak / MD2 / Crypt / Error detection and correction / Cryptographic hash functions / Cryptography

CA642: C RYPTOGRAPHY AND N UMBER T HEORY 8 1

Add to Reading List

Source URL: www.computing.dcu.ie

Language: English - Date: 2014-10-30 10:52:49
296Computing / Cryptographic hash functions / Information retrieval / Information science / Hash function / Database / Hash list / Email / Error detection and correction / Hashing / Search algorithms

ABOUT goTrace is developed by United Nations Office on Drugs and Crime (UNODC). The United Kingdom provided the goTrace Project with seed funding in[removed]This has allowed a prototype to be developed and offered for tri

Add to Reading List

Source URL: www.imolin.org

Language: English - Date: 2015-03-20 06:35:24
297Information science / Artificial intelligence / Error detection and correction / Hash functions / Hash table / Cryptographic hash functions / Trie / Linked list / Perfect hash function / Hashing / Search algorithms / Information retrieval

VISUAL BASIC COLLECTIONS AND HASH TABLES Thomas Niemann Preface

Add to Reading List

Source URL: www.epaperpress.com

Language: English - Date: 2014-07-10 21:19:43
298Cryptographic hash functions / Permutations / NIST hash function competition / Grøstl / Combinatorics / Advanced Encryption Standard / Block cipher / SHA-1 / SHA-2 / Cryptography / Mathematics / Error detection and correction

Improved Cryptanalysis of AES-like Permutations Jérémy Jean1 , María Naya-Plasencia2 , and Thomas Peyrin3 École Normale Supérieure, France INRIA Paris-Rocquencourt, France Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 06:21:47
299Artificial intelligence / Information retrieval / Bloom filter / Hash function / Cryptographic hash functions / Hash table / Password / Rainbow table / Password strength / Search algorithms / Hashing / Cryptography

An Algorithm for Approximate Membership Checking With Application to Password Security Udi Manber1 and Sun Wu Department of Computer Science University of Arizona

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-23 23:03:02
300Key management / Public-key cryptography / Precomputation / Hash tree / Post-quantum cryptography / Digital signature / Quantum digital signature / SHA-2 / Collision resistance / Cryptography / Cryptographic hash functions / Hashing

Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms Aydin Aysu, Patrick Schaumont Secure Embedded Systems Center for Embedded Systems for Critical Applications

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 21:36:12
UPDATE