Cryptographic hash functions

Results: 1068



#Item
921Provable security / Public-key cryptography / Oracle machine / Oracle Corporation / Computer security / Standard model / Linked timestamping / Cryptography / Cryptographic hash functions / Random oracle

PDF Document

Add to Reading List

Source URL: dspace.utlib.ee

Language: English - Date: 2011-04-21 20:04:56
922Search algorithms / Cryptography / Academia / Knowledge / Neil Gershenfeld / Year of birth missing / Hash function / Doctorate / Professor / Hashing / Education / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: alumni.media.mit.edu

Language: English - Date: 2001-07-08 09:43:43
923Computer programming / MD5 / SHA-1 / SHA-2 / Lookup table / Exclusive or / Padding / MD2 / Rijndael S-box / Cryptographic hash functions / Abstract algebra / Computing

PDF Document

Add to Reading List

Source URL: www.washburnresearch.org

Language: English - Date: 2008-11-01 09:33:58
924Applied mathematics / Hashing / Cryptographic hash functions / Analysis of algorithms / Universal hashing / Hash table / Hash function / Parallel Random Access Machine / NC / Theoretical computer science / Search algorithms / Computational complexity theory

PDF Document

Add to Reading List

Source URL: www.unclaw.com

Language: English - Date: 2009-04-03 14:08:37
925Information science / Error detection and correction / Artificial intelligence / Hash join / Hash table / Cryptographic hash functions / Hash function / Trie / Query optimizer / Hashing / Search algorithms / Information retrieval

PDF Document

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:23:47
926Information retrieval / Artificial intelligence / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

scrypt.dvi

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
927NIST hash function competition / Skein / Hashing / Threefish / Rotational cryptanalysis / SHA-2 / SHA-1 / Feistel cipher / Stefan Lucks / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.skein-hash.info

Language: English - Date: 2012-03-27 04:10:33
928Search algorithms / Preimage attack / Collision attack / MD5 / Random oracle / Collision resistance / SHA-1 / Hash chain / Collision / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: www.cs.ut.ee

Language: English - Date: 2006-03-20 09:54:54
929Cryptographic hash functions / Information retrieval / Artificial intelligence / Hash table / Hash function / Collision / Double hashing / SHA-1 / Trie / Hashing / Search algorithms / Cryptography

PDF Document

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2003-05-15 07:53:20
930Hashing / Public-key cryptography / Electronic commerce / Merkle–Damgård construction / Padding / MD5 / HMAC / Flickr / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2009-09-27 19:06:37
UPDATE