Cryptographic hash functions

Results: 1068



#Item
951Rainbow table / Computer programming / Information retrieval / Hashing / Hash function / Trie / Password / Cryptanalysis / Lookup table / Search algorithms / Cryptographic hash functions / Computing

PDF Document

Add to Reading List

Source URL: lasecwww.epfl.ch

Language: English - Date: 2010-02-19 06:31:30
952Cryptography / SHA-2 / SANDstorm hash / SHA-1 / MD6 / NaSHA / Keccak / Elliptic curve only hash / Collision attack / Error detection and correction / Cryptographic hash functions / NIST hash function competition

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:18:38
953Fast Syndrome Based Hash / Hash function / Linear code / MD5 / Collision resistance / SHA-2 / Low-density parity-check code / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2007-05-11 03:26:00
954Man-in-the-middle attack / Key size / Brute-force attack / VEST / Block cipher / Cipher / Advanced Encryption Standard / Meet-in-the-middle attack / Key schedule / Cryptography / Stream ciphers / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-02-07 00:29:28
955Hashing / Public-key cryptography / VEST / Hash function / Hash table / Accumulator / RSA / Universal hashing / Digital signature / Cryptography / Cryptographic hash functions / Search algorithms

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-18 16:59:54
956Randomness / Hashing / Information theory / Computational complexity theory / Cryptographic hash functions / Randomness extractor / Leftover hash lemma / Random oracle / Random number generation / Cryptography / Applied mathematics / Theoretical computer science

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-19 16:27:05
957Hashing / Message authentication codes / Advanced Encryption Standard / Merkle–Damgård construction / Hash function / Block cipher / Padding / HMAC / Grøstl / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:38:35
958Hashing / SHA-2 / HMAC / Hash function / Aurora / Merkle–Damgård construction / Collision attack / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:33:54
959Finite fields / Group theory / Cryptography / Cryptographic hash functions / Field theory / Elliptic curve only hash / Elliptic curve / Discrete logarithm / Polynomial / Abstract algebra / Algebra / Mathematics

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:01:14
960Search algorithms / Padding / Hash function / Crypt / Bit array / Advanced Encryption Standard / Merkle–Damgård construction / HAS-V / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:50:45
UPDATE