Hash function

Results: 1800



#Item
511Search algorithms / Jaccard index / Bloom filter / Hash function / Estimator / Statistics / MinHash / Hashing

Microsoft PowerPoint - Slide.pptx

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2014-04-08 19:44:04
512Cryptographic hash functions / Hash chain / Hash function / Password / S/KEY / Rainbow table / Hash table / Cryptography / Hashing / Search algorithms

Construction and Traversal of Hash Chain with Public Links Vipul Goyal OSP Global Mumbai, India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-26 16:46:21
513Search algorithms / Error detection and correction / Preimage attack / Ciphertext indistinguishability / Advantage / Random oracle / Hash function / Cryptography / Cryptographic hash functions / Hashing

Properties of Cryptographic Hash Functions Michal Rjaˇsko Department of Computer Science, Faculty of Mathematics, Physics and Informatics, Comenius University, Bratislava. E-mail: Abstract. Thi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 05:01:45
514Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Crypt / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees Technical Report A/390/CRI Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2008-01-11 06:10:48
515Block cipher / Hash function / Collision attack / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Error detection and correction

Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-24 08:27:19
516Search algorithms / One-way compression function / Merkle–Damgård construction / MD5 / Preimage attack / Hash function / Cryptography / Cryptographic hash functions / Hashing

Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei, Guozhu Feng , Li Chao , and RuiLin Li Department of Science, National University of Defense Technology,Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-11 22:39:37
517Mathematics / Merkle–Damgård construction / Hash function / Preimage attack / MD5 / SHA-1 / SHA-2 / Entropy / Collision attack / Cryptography / Cryptographic hash functions / Error detection and correction

Active Domain Expansion for Narrow-pipe Hash Xigen Yao Wuxi Hengqi Electromechanical Device Co.Ltd.China email : November 30, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-11-29 17:20:16
518SHACAL / SHA-1 / Ciphertext / NIST hash function competition / Index of cryptography articles / One-way compression function / Cryptography / Cryptographic hash functions / Block ciphers

Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 07:11:39
519Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
520Impossible differential cryptanalysis / Block cipher / Differential cryptanalysis / HMAC / Symmetric-key algorithm / Cryptographic hash function / COSIC / Aanval / Advanced Encryption Standard / Cryptography / Hashing / SHACAL

KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-28 12:43:02
UPDATE