Error function

Results: 718



#Item
611Error detection and correction / Preimage attack / Search algorithms / Hash function / Collision attack / Birthday attack / Hash tree / Padding / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damg˚ ard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-02-02 00:00:00
612Computer architecture / Cryptographic hash functions / Instruction set architectures / Keccak / Skein / SHA-1 / Fugue / SHA-2 / CPU cache / Error detection and correction / NIST hash function competition / Computing

SHA-3 Conference, August 2010, Comparative Performance Review of the SHA-3 Second-Round Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 13:39:10
613GOST standards / Grøstl / NIST hash function competition / GOST / Advanced Encryption Standard / Block cipher / MD5 / SHA-1 / Differential cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Integral Distinguishers for Reduced-round Stribog Riham AlTawy and Amr M. Youssef

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 15:56:16
614Grøstl / Differential cryptanalysis / Advanced Encryption Standard / Hash function / Block cipher / Cryptographic hash functions / Cryptography / NIST hash function competition / Error detection and correction

Updated Differential Analysis of Grøstl Martin Schl¨affer Institute for Applied Information Processing and Communications (IAIK)

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:06
615NIST hash function competition / Eli Biham / SHA-2 / SHA-1 / Preimage attack / MD5 / Advanced Encryption Standard / Keccak / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2010-08-24 17:09:24
616Hashing / Hash function / Preimage attack / Padding / SHA-2 / Collision attack / Merkle–Damgård construction / Collision resistance / One-way compression function / Cryptographic hash functions / Cryptography / Error detection and correction

A Framework for Iterative Hash Functions — HAIFA Eli Biham1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-08 13:12:03
617NIST hash function competition / Search algorithms / MD5 / BLAKE / Keccak / Hash function / Block cipher / Differential cryptanalysis / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Analysis of BLAKE2 Jian Guo1 , Pierre Karpman1,2 , Ivica Nikoli´c1 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-29 13:50:06
618Runge–Kutta methods / Numerical integration / Truncation error / Classification of discontinuities / Function / Mathematics / Mathematical analysis / Numerical analysis

Applied Numerical Mathematics[removed]–458 Solving DDEs in M ATLAB

Add to Reading List

Source URL: www.ecaa.ntu.edu.tw

Language: English - Date: 2005-08-02 02:22:12
619Cryptographic hash functions / Microsoft App-V / Hash tree / Hash function / Computing / Computer memory / Information / Data / Error detection and correction / Cache / Hashing

Missive: Fast Appliance Launch From an Untrusted Buffer Cache Jon Howell, Jeremy Elson, Bryan Parno, John R. Douceur Microsoft Research, Redmond, WA

Add to Reading List

Source URL: 131.107.65.14

Language: English - Date: 2013-01-31 17:33:54
620Keccak / NIST hash function competition / RadioGatún / Joan Daemen / SHA-1 / SHA-2 / National Security Agency / Hash function / Cryptographic hash functions / Error detection and correction / Cryptography

Keccak and the SHA-3 Standardization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-11 13:30:30
UPDATE