Cryptographic hash functions

Results: 1068



#Item
961Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:17
962Hashing / SHA-2 / SHA-1 / NIST hash function competition / Padding / Hash function / Crypt / Checksum / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:34:13
963Hashing / SHA-2 / Hash function / Advanced Encryption Standard / Merkle–Damgård construction / Padding / Cryptographic hash functions / Cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:49
964Preimage attack / One-way compression function / GOST / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: 131002.net

Language: English
965SHA-2 / Benchmark / Java / Skein / CPU cache / Just-in-time compilation / Computing / Cryptographic hash functions / NIST hash function competition

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 15:02:22
966Computer programming / Cryptographic hash functions / Cryptography / Error detection and correction / Bloom filter / Hash table / Hash function / SHA-1 / Hash list / Hashing / Computing / Search algorithms

PDF Document

Add to Reading List

Source URL: www.simson.net

Language: English
967Cryptographic hash functions / Artificial intelligence / Information retrieval / Computational complexity theory / Universal hashing / Hash function / Leftover hash lemma / Cramer–Shoup cryptosystem / Tabulation hashing / Hashing / Cryptography / Search algorithms

PDF Document

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2001-12-12 07:00:25
968Web services / Cryptographic hash functions / Amazon Elastic Compute Cloud / Cloud infrastructure / Infrastructure as a Service / Key management / SHA-2 / Key size / SHA-1 / Cloud computing / Cryptography / Computing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-17 09:04:41
969SHA-2 / One-way compression function / Differential cryptanalysis / MD5 / SHACAL / Hash function / Preimage attack / Collision attack / Boomerang attack / Cryptography / Cryptographic hash functions / SHA-1

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-20 11:25:59
970SHA-2 / NIST hash function competition / Crypt / Hash function / Skein / Hash list / Computer programming / Artificial intelligence / Key stretching / Cryptographic hash functions / Field-programmable gate array / Computing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 04:31:20
UPDATE