Cryptographic hash functions

Results: 1068



#Item
371SHA-1 / Collision / Krypto / Institute for Applied Information Processing and Communications / Cryptographic hash functions / DC Comics / 2J

Microsoft PowerPoint - Pramstaller_CarryImpactSHA1_v13_topublish.ppt

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-20 04:40:59
372Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
373Cryptographic hash functions / HMAC / SHA-1 / MD5 / Collision attack / Hash function / MD4 / Collision resistance / SHA-2 / Error detection and correction / Cryptography / Hashing

Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb

Add to Reading List

Source URL: www.jucs.org

Language: English - Date: 2008-09-17 07:43:00
374CTC / SHA-2 / Computer programming / C / Computing / Cryptographic hash functions / Software engineering

Microsoft Word - CTC September Project Allocations List.docx

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2012-02-22 15:50:47
375Computing / Information / Cryptographic hash functions / Error detection and correction / Hash table / Hash function / Trie / Lookup table / Secure multi-party computation / Hashing / Search algorithms / Cryptography

Fast Privacy-Preserving Top-𝑘 Queries using Secret Sharing (Invited Paper) Martin Burkhart Xenofontas Dimitropoulos

Add to Reading List

Source URL: sepia.ee.ethz.ch

Language: English - Date: 2011-01-06 04:06:32
376SHA-2 / Computing / Cryptographic hash functions / CTC / SHA-1

JANUARY 2014 CTC PROJECT ALLOCATION LIST Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-01-30 15:55:59
377Computing / Software / Bitcoin / Peer-to-peer computing / Cryptography / Dwolla / Hashing / Cryptographic hash functions / Error detection and correction

FEATURE BITCOIN What in the name of Zeus is it? Bitcoin is a digital currency that became popular in[removed]It’s not controlled by governments, banks, or anyone. It’s a decentralised

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2014-11-12 07:51:25
378Electronic commerce / RSA / Digital signature / Full Domain Hash / Hash function / XTR / Oracle machine / Random oracle / Prime number / Cryptography / Public-key cryptography / Cryptographic hash functions

Security Proof for Partial-Domain Hash Signature Schemes Jean-S´ ebastien Coron Gemplus Card International

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
379Relational database management systems / Cryptographic hash functions / Query languages / Computer network security / Password / Rainbow table / LM hash / Microsoft SQL Server / Adaptive Server Enterprise / Computing / Computer security / Cryptography

White Paper Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-14 14:17:40
380Cryptographic hash functions / Hashing / Advanced Encryption Standard / HMAC / SHA-2 / FIPS 140-2 / OpenSSL / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

OpenSSL FIPS Object Module Version 1.2 By the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2009-11-20 10:26:39
UPDATE