Cryptographic hash functions

Results: 1068



#Item
981Hashing / Crypt / NIST hash function competition / Secure Hash Standard / Collision attack / MD5 / MD4 / Advanced Encryption Standard / HMAC / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:29:36
982Cryptographic protocols / Cryptographic hash functions / Computational complexity theory / IP / Zero-knowledge proof / Lattice problem / Universal hashing / XTR / Lattice / Cryptography / Mathematics / Abstract algebra

PDF Document

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2008-01-17 15:45:07
983Polynomials / Cryptography / Field theory / Cryptographic hash functions / Lattice / Ideal lattice cryptography / Irreducible polynomial / Algebraic number field / Ideal / Abstract algebra / Mathematics / Algebra

PDF Document

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-12-19 00:08:43
984SHA-2 / SHA-1 / Preimage attack / Padding / Advanced Encryption Standard / Block cipher / NIST hash function competition / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:28
985Hashing / NIST hash function competition / Advanced Encryption Standard / Merkle–Damgård construction / SHA-1 / Padding / RadioGatún / HMAC / Grøstl / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:01
986SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:48:42
987Hashing / Search algorithms / SHA-1 / SHA-2 / Hash function / Padding / HMAC / Bit array / Provably secure cryptographic hash function / Error detection and correction / Cryptographic hash functions / Cryptography

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:01:56
988Mathematics / Search algorithms / Preimage attack / Merkle–Damgård construction / Hash function / Function / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-01 05:52:56
989Hashing / NIST hash function competition / One-way compression function / Padding / Block cipher / Hash function / HMAC / Collision attack / ICE / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:06:39
990Hashing / Padding / Perm / Hash function / Merkle–Damgård construction / One-way compression function / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-13 07:16:54
UPDATE