Hash

Results: 3740



#Item
1Cryptography / Message authentication codes / Error detection and correction / Cryptographic hash functions / Hashing / HMAC / Hash function / MD5 / GOST / SHA-1 / Checksum / UMAC

New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:35
2Cryptography / Post-quantum cryptography / Public-key cryptography / Hashing / Error detection and correction / Digital signature / Hash chain / XMSS / Cryptographic hash function / Merkle tree / Hash function / Key

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-06-21 04:41:26
3Cryptography / Post-quantum cryptography / Cryptographic hash functions / Hash-based cryptography / Hashing / Collision resistance / Hash function / Hash / Index of cryptography articles / Lamport signature

Hash-Based Signatures Stefan-Lukas Gazdag 5th ENISA/FORTH Summer School, 27th of September 2018

Add to Reading List

Source URL: nis-summer-school.enisa.europa.eu

Language: English - Date: 2018-10-08 04:24:21
4Cryptography / Cryptographic hash functions / Error detection and correction / Hashing / NIST hash function competition / Secure Hash Algorithms / SHA-3 / SHA-1 / Crypt / SHA-2

Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2017-02-27 12:19:53
5Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-10-07 06:08:08
6Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26
7Cryptography / Cryptographic hash functions / Post-quantum cryptography / Hashing / Search algorithms / Power analysis / XMSS / Hash function / SHA-2 / DPA / Digital signature / Crypt

Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-03-26 10:26:09
8Cryptography / Public-key cryptography / Post-quantum cryptography / Hashing / Hash-based cryptography / XMSS / Cryptographic hash function / Merkle signature scheme / Digital signature / HMAC / RSA / Power analysis

Physical Attack Vulnerability of Hash-Based Signature Schemes Verwundbarkeit von Hash-basierten Signaturverfahren durch Physikalische Angriffe Master-Thesis von Matthias Julius Kannwischer Tag der Einreichung:

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-06-25 08:42:52
9Theoretical computer science / Emerging technologies / Quantum information science / Quantum computing / Quantum cryptography / Applied mathematics / Quantum mechanics / Quantum algorithm / Hash function / Quantum information / Quantum machine learning

Cost analysis of hash collisions: will quantum computers make SHARCS obsolete? D. J. Bernstein University of Illinois at Chicago NSF ITR–

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
10Search algorithms / Information retrieval / Information science / Cryptography / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Hopf decomposition / Compound of twelve pentagonal antiprisms with rotational freedom

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
UPDATE