Cryptographic hash functions

Results: 1068



#Item
501Error detection and correction / Search algorithms / Hash function / Merkle–Damgård construction / Preimage attack / Hash list / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
502Internet protocols / Secure communication / Electronic commerce / HMAC / Cipher suite / FIPS 140 / SHA-2 / RSA / Advanced Encryption Standard / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 4g - McAfee NSP V6 1 IPS-NAC SecurityPolicy v1_11_HL2011[removed]Copy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
503Cryptography / Collision resistance / Hash function / Hash list / SHA-2 / Collision / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Hashing

Classification of Hash Functions Suitable for Real-life Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:53:32
504Hash function / MD5 / Collision resistance / SHA-1 / MD4 / RadioGatún / Block cipher / SHA-2 / Collision / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]RFadioGatun, a belt-and-mill hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:22:30
505Wang Xiaoyun / Computer programming / MD5 / Computing / Chaining / Frances Yao / Logic programming / Mathematics / SHA-2 / Cryptographic hash functions / SHA-1 / Behaviorism

Microsoft PowerPoint - SHA1-new-Result-NIST

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:23:36
506SHA-1 / MD5 / Computing / Applied mathematics / MD4 / Hamming weight / Gaussian elimination / Cryptographic hash functions / Mathematics / SHA-2

Gr¨ obner Basis Based Cryptanalysis of SHA-1 Makoto Sugita ∗

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:15:48
507One-way compression function / Hash function / Collision attack / Collision resistance / Provably secure cryptographic hash function / GOST / Cryptographic hash functions / Cryptography / Hashing

A Note on the security proof of Knudsen-Preneel construction of a hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:26:04
508Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction

Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:54:18
509SHA-2 / MD5 / Error detection and correction / Cryptographic hash functions / SHA-1

Cryptographic Hash Workshop[removed]Message Modification, Neutral Bits and Boomerangs: From Which Round Should we Start Counting in SHA?"

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:22:30
510Cryptography standards / Elliptic curve cryptography / HMAC / SHA-1 / SHA-2 / Key size / FIPS 140-2 / PBKDF2 / Crypto++ / Cryptography / Cryptographic software / Cryptographic hash functions

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-24 12:10:48
UPDATE