Cryptographic hash functions

Results: 1068



#Item
21Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-27 10:26:48
22Cryptography / Cryptographic hash functions / Information retrieval / Search algorithms / Hashing / Permutations / Error detection and correction / Hash function / Advantage / Birthday attack / Parity of a permutation / One-way compression function

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-05-26 20:18:15
23Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
24Cryptography / Cryptographic hash functions / Public-key cryptography / Error detection and correction / Hash function / Digital signature / Parameter / SECG / SHA-2

Elliptic Curve Abe-Okamoto-Suzuki Message Recovery Signature Scheme (ECAOS) Working DraftAugust 25,

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
25Cryptography / NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Joan Daemen / Gilles Van Assche / Differential cryptanalysis / Data Encryption Standard

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
26Computing / Software / Cryptographic hash functions / Error detection and correction / Hashing / Checksum / SHA-1 / Sha1sum / Hash list / OneDrive / Hash function / Zip

CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

Add to Reading List

Source URL: orb.essex.ac.uk

Language: English - Date: 2015-12-05 03:37:29
27Search algorithms / Hashing / Cryptographic hash functions / Computational complexity theory / Error detection and correction / Universal hashing / Hash function / UMAC / Hash table / Locality-sensitive hashing / Randomness extractor

Variationally Universal Hashing Ted Krovetz a and Phillip Rogaway b,c a Department of Computer Science, California State University Sacramento CAUSA

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-07-02 16:14:32
28Computer storage devices / Cryptographic hash functions / Error detection and correction / Data management / Search algorithms / Search engine indexing / Crypt / Content-addressable storage / Backup / Data storage device / Data / SHA-1

libchop, a library for distributed storage & data backup

Add to Reading List

Source URL: www.nongnu.org

Language: English - Date: 2010-07-25 03:57:46
29Error detection and correction / Hashing / Cryptographic hash functions / Search algorithms / Malware / Malware analysis / Computer virus / Antivirus software / Hash function / MD5 / Hash list / Crypt

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
30NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
UPDATE