Error function

Results: 718



#Item
671Hashing / Message authentication codes / Advanced Encryption Standard / Merkle–Damgård construction / Hash function / Block cipher / Padding / HMAC / Grøstl / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:38:35
672Hashing / SHA-2 / HMAC / Hash function / Aurora / Merkle–Damgård construction / Collision attack / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:33:54
673Hashing / SHA-2 / SHA-1 / NIST hash function competition / Padding / Hash function / Crypt / Checksum / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:34:13
674Hashing / SHA-2 / Hash function / Advanced Encryption Standard / Merkle–Damgård construction / Padding / Cryptographic hash functions / Cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:49
675Internet / Network architecture / Checksum / Transmission Control Protocol / Cksum / Cryptographic hash function / Hash function / Ip / Header checksum / Computing / Error detection and correction / Internet standards

PDF Document

Add to Reading List

Source URL: www.gray-world.net

Language: English - Date: 2010-06-12 03:14:41
676Preimage attack / One-way compression function / GOST / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: 131002.net

Language: English
677Computer programming / Cryptographic hash functions / Cryptography / Error detection and correction / Bloom filter / Hash table / Hash function / SHA-1 / Hash list / Hashing / Computing / Search algorithms

PDF Document

Add to Reading List

Source URL: www.simson.net

Language: English
678Cryptography / SHA-1 / SHA-2 / NaSHA / SANDstorm hash / Elliptic curve only hash / Keccak / Collision attack / Preimage attack / Error detection and correction / NIST hash function competition / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-04-19 10:02:27
679Preimage attack / Collision attack / SHA-1 / MD5 / SHA-2 / Collision resistance / Tiger / Hash function / Hash tree / Cryptographic hash functions / Cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-02-18 13:57:44
680SHA-2 / SHA-1 / Secure Hash Standard / Digital Signature Algorithm / NIST hash function competition / HMAC / Crypt / Message authentication code / CRYPTREC / Cryptographic hash functions / Cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-12 13:46:08
UPDATE