Hash function

Results: 1800



#Item
201

Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV J. Black ∗ P. Rogaway

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:04:54
    202

    Security Analysis of the Mode of JH Hash Function Rishiraj Bhattacharyya1 , Avradip Mandal2 , and Mridul Nandi3? 1 3

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English - Date: 2011-12-28 03:46:39
      203Information science / Search algorithms / Information retrieval / Nearest neighbor search / Locality-sensitive hashing / Similarity search / PageRank / Search engine indexing / Computational geometry / Hash function / IDistance / Search engine technology

      Predictive Indexing for Fast Search Sharad Goel Yahoo! Research New York, NY 10018

      Add to Reading List

      Source URL: hunch.net

      Language: English - Date: 2009-01-12 15:37:21
      204Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

      Introduction MD New Results I

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2008-09-27 14:59:29
      205Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

      How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

      Add to Reading List

      Source URL: www.anf.es

      Language: English - Date: 2014-05-12 07:16:17
      206

      Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2009-08-09 19:41:15
        207

        Cryptanalysis of the Round-Reduced Kupyna Hash Function Jian Zou1,2 , Le Dong3 1 Mathematics and Computer Science of Fuzhou University, Fuzhou, China, 350108

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-10-02 05:54:11
          208Cryptography / Serge Vaudenay / Provable security / Zhang Fangguo / Cryptographic primitive / Willy Susilo / Block cipher / Cryptographic hash function

          - Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

          Add to Reading List

          Source URL: security-lab.jaist.ac.jp

          Language: English - Date: 2015-08-13 01:39:17
          209Cryptography / Deterministic encryption / Encryption / Hash function / Bloom filter / Padding / Key

          raykova.ccsw_sads [Compatibility Mode]

          Add to Reading List

          Source URL: digitalpiglet.org

          Language: English - Date: 2009-11-28 04:00:03
          210Mellon / Carnegie Mellon University / Hash function / Carnegie

          Carnegie Mellon University Implementation Tutorial of Parameter Server

          Add to Reading List

          Source URL: www.mlss2014.com

          Language: English - Date: 2014-07-14 11:00:05
          UPDATE