Cryptographic hash functions

Results: 1068



#Item
61Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
62Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 07:34:05
63

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

Add to Reading List

Source URL: s3-eu-west-1.amazonaws.com

Language: English - Date: 2014-12-18 11:32:43
    64Cryptography / Computing / Information science / Cryptographic hash functions / Digital preservation / Records management / Error detection and correction / Digital technology / File Fixity / Checksum / BagIt / Preservation Metadata: Implementation Strategies

    Staffing For Effective Digital Preservation

    Add to Reading List

    Source URL: www.digitalpreservation.gov

    Language: English - Date: 2016-01-20 13:45:27
    65

    Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski Faculty of Information Technology, Mathematics and Electrical Engin

    Add to Reading List

    Source URL: people.item.ntnu.no

    Language: English - Date: 2010-11-24 06:10:58
      66Cryptography / Information retrieval / Search algorithms / Information science / Hashing / Error detection and correction / Hash function / Cryptographic hash function / RSA

      Efficient Negative Databases from Cryptographic Hash Functions George Danezis, Claudia Diaz, Sebastian Faust, Emilia K¨asper, Carmela Troncoso, and Bart Preneel K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10,

      Add to Reading List

      Source URL: www0.cs.ucl.ac.uk

      Language: English - Date: 2013-10-10 06:48:57
      67

      Black-box Property of Cryptographic Hash Functions Michal Rjaˇsko Comenius University in Bratislava Faculty of Mathematics, Physics and Informatics Department of Computer Science

      Add to Reading List

      Source URL: fps2011.dyndns.org

      Language: English
        68Cryptographic hash functions / Cryptography / Hashing / Information retrieval / Error detection and correction / Applied mathematics / SHA-2 / Merkle tree / SHA-1 / Hash list / Baseball at the 2013 East Asian Games / Baseball at the 2007 Southeast Asian Games

        On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

        Add to Reading List

        Source URL: digitalpiglet.org

        Language: English - Date: 2009-11-27 08:30:51
        69Cryptography / Password / Security / Cryptographic hash functions / Salt / Random password generator / Passwd / Crypt / Dictionary attack / Password strength / OTPW

        A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

        Add to Reading List

        Source URL: www.findravi.com

        Language: English - Date: 2009-04-03 23:54:54
        70Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Hash function / Hash table / RSA / Crypt / Block cipher / Universal hashing / Scrypt

        STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

        Add to Reading List

        Source URL: www.daemonology.net

        Language: English - Date: 2009-06-11 07:29:01
        UPDATE