First Page | Document Content | |
---|---|---|
![]() Date: 2003-11-05 07:41:01Search algorithms Provably secure cryptographic hash function Applied mathematics Fast Syndrome Based Hash Hash function One-way function Cyberwarfare Collision resistance Cryptographic hash functions Cryptography Hashing | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 420,81 KBShare Document on Facebook |
![]() | More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong UniversityDocID: 14RVT - View Document |
![]() | SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and DesignDocID: B3JI - View Document |
![]() | CS255: Cryptography and Computer Security Winter 2010DocID: 64pf - View Document |
![]() | PDF DocumentDocID: 10AT - View Document |
![]() | PDF DocumentDocID: Xn6 - View Document |