Elliptic curve only hash

Results: 13



#Item
1Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
2

Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

Add to Reading List

Source URL: www5.rz.rub.de

Language: English - Date: 2012-07-23 07:34:30
    3Polynomials / Algebraic geometry / Commutative algebra / Computer algebra / System of polynomial equations / Finite field / NP / Time complexity / Elliptic curve only hash / Abstract algebra / Mathematics / Algebra

    PDF Document

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-21 04:05:40
    4Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

    Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-12-31 14:07:22
    5Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

    An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 1998-07-30 12:00:14
    6Error detection and correction / Hash function / One-way compression function / Elliptic curve only hash / Cryptography / Cryptographic hash functions / Hashing

    CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2003-02-14 22:08:35
    7Search algorithms / Error detection and correction / Hash function / Random oracle / Oracle machine / Preimage attack / Elliptic curve only hash / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

    X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-20 09:10:52
    8Cryptography / SHA-2 / SANDstorm hash / SHA-1 / MD6 / NaSHA / Keccak / Elliptic curve only hash / Collision attack / Error detection and correction / Cryptographic hash functions / NIST hash function competition

    PDF Document

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-07 14:18:38
    9Finite fields / Group theory / Cryptography / Cryptographic hash functions / Field theory / Elliptic curve only hash / Elliptic curve / Discrete logarithm / Polynomial / Abstract algebra / Algebra / Mathematics

    PDF Document

    Add to Reading List

    Source URL: ehash.iaik.tugraz.at

    Language: English - Date: 2008-12-11 07:01:14
    10Cryptography / SHA-1 / SHA-2 / NaSHA / SANDstorm hash / Elliptic curve only hash / Keccak / Collision attack / Preimage attack / Error detection and correction / NIST hash function competition / Cryptographic hash functions

    PDF Document

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2009-04-19 10:02:27
    UPDATE