Error function

Results: 718



#Item
631Hashing / SHA-1 / SHA-2 / Collision attack / MD4 / Preimage attack / MD5 / Hash function / Collision resistance / Error detection and correction / Cryptography / Cryptographic hash functions

Further progress in hashing cryptanalysis∗ Arjen K. Lenstra Lucent Technologies, Bell Laboratories

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
632Hashing / Message authentication codes / Coding theory / HMAC / SHA-2 / MD5 / Key derivation function / Collision attack / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
633NIST hash function competition / Hashing / MD6 / MD5 / MD4 / SHA-2 / SHA-1 / Collision resistance / Preimage attack / Error detection and correction / Cryptography / Cryptographic hash functions

Security Proofs for the MD6 Hash Function Mode of Operation by

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-11-05 16:27:34
634MD5 / Hashing / Collision attack / SHA-1 / MD4 / Hash function / Collision resistance / Padding / Birthday attack / Cryptography / Error detection and correction / Cryptographic hash functions

Eindhoven University of Technology Department of Mathematics and Computing Science

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-07-05 06:20:54
635Whirlpool / Crypt / Hash function / Cryptographic hash functions / Cryptography / Error detection and correction

Microsoft Word - 3. High-Speed Parallel Architecture of the Whirlpool Hash Function

Add to Reading List

Source URL: www.sersc.org

Language: English - Date: 2009-07-31 02:54:04
636Hashing / Hash function / Artificial intelligence / Information retrieval / Searching / Cryptographic hash functions / Error detection and correction / Cryptography

Observations on H-PRESENT-128 Niels Ferguson Microsoft

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-08-17 15:01:29
637Search algorithms / Cryptographic hash functions / EMC Corporation / SecurID / Hash function / Hash list / Hashing / Error detection and correction / Cryptography

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yinini

Add to Reading List

Source URL: www.crypto-world.com

- Date: 2011-04-01 07:21:47
638Analytic functions / Error function / Gaussian function / Valuation / Factorial / Mathematics / Mathematical analysis / Abstract algebra

Orthogonal and diagonal dimension fluxes of hyperspherical function

Add to Reading List

Source URL: www.advancesindifferenceequations.com

Language: English
639Hashing / Information retrieval / Artificial intelligence / Error detection and correction / Hash function / Bloom filter / Hash table / One-way compression function / Cryptography / Search algorithms / Cryptographic hash functions

Space/Time Trade-offs in Hash Coding with Allowable Errors

Add to Reading List

Source URL: crystal.uta.edu

Language: English - Date: 2005-04-12 16:14:35
640Mathematics / Computing / Logarithms / Hashing / Error detection and correction / Hash table / Hash function / MD5 / Trie / Cryptography / Cryptographic hash functions / Search algorithms

Parallel Collision Search with Application to Hash Functions and Discrete Logarithms Paul C. van Oorschot and Michael J. Wiener

Add to Reading List

Source URL: www.certainkey.com

Language: English - Date: 2001-09-18 05:27:04
UPDATE