Cryptographic hash functions

Results: 1068



#Item
971SHA-1 / Preimage attack / MD5 / Collision attack / NIST hash function competition / Padding / Collision resistance / Cryptographic hash functions / Cryptography / SHA-2

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-28 08:32:30
972Cryptography / SHA-1 / SHA-2 / NaSHA / SANDstorm hash / Elliptic curve only hash / Keccak / Collision attack / Preimage attack / Error detection and correction / NIST hash function competition / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-19 10:02:27
973Random oracle / Applied mathematics / Oracle machine / Merkle–Damgård construction / Advantage / Hash function / Mathematics / Cyberwarfare / Cryptographic hash functions / Hashing / Search algorithms

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-02-20 15:25:35
974Message authentication codes / Cryptographic hash functions / HMAC / MD5 / MD4 / Cryptographic protocols / SHA-1 / HAVAL / Transport Layer Security / Cryptography / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-12 14:50:30
975Preimage attack / Collision attack / SHA-1 / MD5 / SHA-2 / Collision resistance / Tiger / Hash function / Hash tree / Cryptographic hash functions / Cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-02-18 13:57:44
976Number theory / Integer factorization algorithms / Modular arithmetic / Integer sequences / Public-key cryptography / Very smooth hash / RSA / Quadratic residue / Smooth number / Mathematics / Cryptography / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-03-08 22:54:11
977Stream ciphers / Cryptographic hash functions / Keystream / Permutation / Rainbow table / Cryptanalysis / Factorial / Function / Correlation attack / Mathematics / Cryptography / Combinatorics

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-23 01:30:36
978Search algorithms / Provably secure cryptographic hash function / Applied mathematics / Fast Syndrome Based Hash / Hash function / One-way function / Cyberwarfare / Collision resistance / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-05 07:41:01
979SHA-2 / SHA-1 / Secure Hash Standard / Digital Signature Algorithm / NIST hash function competition / HMAC / Crypt / Message authentication code / CRYPTREC / Cryptographic hash functions / Cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-12 13:46:08
980Message authentication codes / Cryptographic hash functions / Block cipher / Galois/Counter Mode / SHA-2 / Advanced Encryption Standard / Key size / FIPS 140-2 / Secure Hash Standard / Cryptography / Block cipher modes of operation / Cryptography standards

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 08:42:48
UPDATE