Hash function

Results: 1800



#Item
211

Linearization and Message Modification Techniques for Hash Function Cryptanalysis

Add to Reading List

Source URL: web.spms.ntu.edu.sg

Language: English
    212Cryptography / Cryptographic protocols / Public-key cryptography / Search algorithms / Elliptic Curve Digital Signature Algorithm / Elliptic curve cryptography / Hash function / X.509 / SHA-2

    RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.

    Add to Reading List

    Source URL: www.ietf.org

    Language: English - Date: 2015-07-23 10:29:05
    213Cryptography / Information retrieval / Search algorithms / Information science / Cryptographic hash functions / Hashing / Error detection and correction / Hash table / SHA-1 / Version vector / Hash function / Euclidean vector

    Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

    Add to Reading List

    Source URL: www.oceanstore.org

    Language: English - Date: 2003-03-13 15:50:35
    214Search algorithms / Hashing / Dimension reduction / Locality-sensitive hashing / Error detection and correction / Hash function / Relevance / Recommender system / K-nearest neighbors algorithm

    Real-Time Recommendation of Diverse Related Articles Sofiane Abbar Sihem Amer-Yahia Piotr Indyk

    Add to Reading List

    Source URL: www2013.wwwconference.org

    Language: English - Date: 2014-07-21 08:47:06
    215

    1 Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform Mohamed El Hadedy1,2 , Danilo Gligoroski3 and Svein J. Knapskog

    Add to Reading List

    Source URL: people.item.ntnu.no

    Language: English - Date: 2010-11-02 08:23:10
      216Software testing / Search algorithms / Theoretical computer science / Fuzz testing / Hash function / Algorithm / Mathematical optimization / Software bug / Information retrieval / Software engineering / Mathematics

      Dynamic Test Generation for Large Binary Programs by David Alexander Molnar A.B. (Harvard CollegeM.S. (University of California, Berkeley) 2006

      Add to Reading List

      Source URL: www.dmolnar.com

      Language: English - Date: 2009-08-16 21:04:01
      217Cryptography / Hashing / Error detection and correction / Public-key cryptography / Search algorithms / Digital signature / Cryptographic hash function / Post-quantum cryptography / RSA / Hash function / Merkle tree / MD5

      SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

      Add to Reading List

      Source URL: cryptojedi.org

      Language: English - Date: 2014-10-04 10:08:48
      218Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

      SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:14
      219Message authentication codes / CBC-MAC / Block cipher / SHA-1 / Cryptographic hash function / Padding / UMAC / Hash-based message authentication code / Hash function / One-way compression function / Galois/Counter Mode

      A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

      Add to Reading List

      Source URL: jda.noekeon.org

      Language: English - Date: 2013-08-28 07:53:26
      220Computing / Internet / Software / Internet privacy / Computer networking / Internet protocols / Network performance / Proxy server / Reverse proxy / Transport Layer Security / Cryptographic hash function / Load balancing

      Validating Web Content with Senser Jordan Wilberding Georgetown University Andrew Yates Georgetown University

      Add to Reading List

      Source URL: security.cs.georgetown.edu

      Language: English - Date: 2013-10-29 13:52:26
      UPDATE