Hash function

Results: 1800



#Item
521Search algorithms / MD4 / Cryptographic hash function / Collision attack / Crypt / Hash function / Q / Cryptography / Hashing / MD5

Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-03-17 08:25:34
522SHA-1 / SHA-2 / Hash function / Block cipher modes of operation / Block cipher / Authenticated encryption / Ciphertext indistinguishability / One-way compression function / Index of cryptography articles / Cryptography / Error detection and correction / Cryptographic hash functions

COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 05:30:49
523Search algorithms / Error detection and correction / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Hashing

Cryptanalysis of the Hash Function LUX-256 Shuang Wu Dengguo Feng Wenling Wu State Key Lab of Information Security, Institute of Software Chinese Academy of Sciences Beijing, China Email: {wushuang,feng,wwl}@is.is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-25 02:38:23
524SHA-1 / Collision attack / MD5 / Keccak / Hash function / Preimage attack / SHA-2 / Differential cryptanalysis / Error detection and correction / Cryptographic hash functions / Cryptography

Cryptanalysis of RadioGat´ un Thomas Fuhr1 and Thomas Peyrin2 1 DCSSI Labs

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-19 11:45:40
525Hashing / Search algorithms / SHA-2 / Collision resistance / Collision attack / Fast Fourier transform / Hash function / MD4 / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 19:34:48
526Hashing / Relational model / Query languages / Database theory / Relational database / Rsync / Hash function / Cksum / Checksum / Computing / Data management / Software

Remote Comparison of Database Tables Technical Report A/375/CRI Fabien Coelho ´ Centre de Recherche en Informatique, Ecole

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2006-02-06 04:59:56
527Information retrieval / Locality-sensitive hashing / Hash function / Point location / N-sphere / Approximation algorithm / Nearest neighbor search / Search algorithms / Information science / Artificial intelligence

Optimal Data-Dependent Hashing for Approximate Near Neighbors Alexandr Andoni∗ † Ilya Razenshteyn∗ ‡ March 18, 2015

Add to Reading List

Source URL: www.ilyaraz.org

Language: English - Date: 2015-03-18 00:06:14
528Information retrieval / Information science / Computing / Bloom filter / Hash table / Hash function / Cryptographic hash function / Bit array / Jeffrey Ullman / Search algorithms / Hashing / Cryptography

Note to other teachers and users of these slides: We would be delighted if you found this our material useful in giving your own lectures. Feel free to use these slides verbatim, or to modify them to fit your own needs.

Add to Reading List

Source URL: www.mmds.org

Language: English - Date: 2014-08-11 12:24:56
529Advanced Encryption Standard / SHA-1 / MD4 / Collision attack / Stream cipher / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Block cipher

Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-11 13:21:29
530Mathematics / Locality-sensitive hashing / Nearest neighbor search / Lattice / Hash function / Information science / Search algorithms / Information retrieval

Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions∗ Piotr Indyk MIT

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2006-10-01 00:51:44
UPDATE