Cryptographic hash functions

Results: 1068



#Item
511NIST hash function competition / Cyberwarfare / Applied mathematics / Cryptography / Cryptographic hash functions / Hashing

Proposed Timeline for the Development of New Hash Functions Elaine Barker NIST [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:00:44
512Collision attack / SHA-2 / MD5 / Hash function / MD4 / RSA / Provably secure cryptographic hash function / One-way compression function / Cryptography / Cryptographic hash functions / SHA-1

C:uments and SettingsydloDocumentsPCTeX Files1padpp-yinszydlosept21.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:20:00
513Message authentication codes / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / SHA-2 / HMAC / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic hash functions

Concepteers Teleconsole TCS6U4W FIPS 140 Security Policy v1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
514Cryptographic protocols / Internet protocols / Internet standards / SHA-2 / SHA-1 / Online Certificate Status Protocol / Cambridge Rindge and Latin School / Cryptography / Cryptographic hash functions / Public-key cryptography

Shared Service Providers Com m on Policy, Certificate and CRL Profile, and Repository Profile David Cooper and Nelson Hastings January 14, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
515Hashing / Search algorithms / Collision attack / Hash function / SHA-1 / Merkle–Damgård construction / MD4 / Steganography / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Using Steganography to Improve Hash Functions’ Collision Resistance Emmanouel Kellinis1 and Konstantinos Papapanagiotou2 1 KPMG LLP, One Canada Square, London E14 5AG, United Kingdom [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:05:58
516Merkle–Damgård construction / Probability theory / Random oracle / Hash function / HMAC / Oracle machine / Collision resistance / Random function / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

Merkle Damgard Revisited: how to Construct a hash Function Jean-Sebastien Coron Yevgeniy Dodis Cecile Malinaud

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
517Cryptography / Cryptographic hash functions / Fourier analysis / Digital signal processing / Unitary operators / Fast Fourier transform / Lattice problem / Discrete Fourier transform / Collision resistance / Mathematics / Algebra / Mathematical analysis

Cryptographic Hash Workshop[removed]Provably Secure FFT Hashing Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:51:28
518Cryptographic hash functions / Internet / Cryptographic protocols / Hashing / Error detection and correction / Steven M. Bellovin / Domain Name System Security Extensions / SHA-1 / MD5 / Cryptography / Computing / Internet protocols

Cryptographic Hash Workshop[removed]Deploying New Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:02:34
519Cryptographic hash functions / SHA-1 / Mathematics

Automated Search for Round 1 Differentials for SHA-1: Work in Progress Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-05 15:52:58
520Hash function / MD5 / MD4 / N-Hash / Lattice problem / NIST hash function competition / Trie / SHA-2 / Collision resistance / Cryptographic hash functions / Cryptography / SHA-1

Cryptographic Hash Workshop[removed]LASH

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:05:04
UPDATE