Hash function

Results: 1800



#Item
191

Analysis of the Kupyna-256 Hash Function Christoph Dobraunig, Maria Eichlseder, and Florian Mendel Graz University of Technology, Austria Abstract. The hash function Kupyna was recentl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-10-01 11:25:53
    192Cryptography / Key management / E-commerce / Public-key cryptography / Cryptocurrencies / Bitcoin / Elliptic Curve Digital Signature Algorithm / RSA / Electronic money / Key / Digital signature / Cryptographic hash function

    Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:41
    193Cryptography / Message authentication codes / Pseudorandom function family / Pseudorandomness / Error detection and correction / Hash-based message authentication code / Advantage / Randomness extractor

    The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-07-24 05:23:52
    194Cryptography / Books on cryptography / Elliptic curve cryptography / Cryptanalysis / RSA / Key size / Public-key cryptography / Cryptographic hash function / Outline of cryptography / Cipher / Block cipher / Elliptic curve

    The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2014-06-30 10:38:30
    195

    Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

    Add to Reading List

    Source URL: www5.rz.rub.de

    Language: English - Date: 2012-07-23 07:34:30
      196

      New Russian Hash Function Standard Dmitry Khovratovich Alexey Urivskiy JSC “InfoTeCS”, Russia

      Add to Reading List

      Source URL: cis.sjtu.edu.cn

      Language: English - Date: 2012-12-05 11:26:11
        197Search algorithms / Data types / Procedural programming languages / Arrays / Hash table / Ur / Doubly linked list / Const / Linked list / Recursion / Hash function / Null

        PDF Document

        Add to Reading List

        Source URL: genome.sph.umich.edu

        Language: English - Date: 2012-10-08 20:20:43
        198Information retrieval / Hashing / Information science / Search algorithms / Error detection and correction / Cryptography / Cryptographic hash functions / Arrays / Hash table / Hash function / Hash list / Hash

        Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗

        Add to Reading List

        Source URL: www.stat.washington.edu

        Language: English - Date: 2010-03-17 13:23:00
        199Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

        Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-09-24 10:22:35
        200

        Published in Journal of Computer Security 5(3):213–223, AUTHENTICATION OF SEQUENCES WITH THE SL2 HASH FUNCTION: APPLICATION TO VIDEO SEQUENCES Jean-Jacques Quisquater

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-09-04 19:44:14
          UPDATE