Hash functions

Results: 1148



#Item
91

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

Add to Reading List

Source URL: s3-eu-west-1.amazonaws.com

Language: English - Date: 2014-12-18 11:32:43
    92Cryptography / Computing / Information science / Cryptographic hash functions / Digital preservation / Records management / Error detection and correction / Digital technology / File Fixity / Checksum / BagIt / Preservation Metadata: Implementation Strategies

    Staffing For Effective Digital Preservation

    Add to Reading List

    Source URL: www.digitalpreservation.gov

    Language: English - Date: 2016-01-20 13:45:27
    93

    Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski Faculty of Information Technology, Mathematics and Electrical Engin

    Add to Reading List

    Source URL: people.item.ntnu.no

    Language: English - Date: 2010-11-24 06:10:58
      94Cryptography / Information retrieval / Search algorithms / Information science / Hashing / Error detection and correction / Hash function / Cryptographic hash function / RSA

      Efficient Negative Databases from Cryptographic Hash Functions George Danezis, Claudia Diaz, Sebastian Faust, Emilia K¨asper, Carmela Troncoso, and Bart Preneel K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10,

      Add to Reading List

      Source URL: www0.cs.ucl.ac.uk

      Language: English - Date: 2013-10-10 06:48:57
      95

      Linearization Framework for Collisions in Hash Functions Willi Meier

      Add to Reading List

      Source URL: indocrypt09.inria.fr

      Language: English - Date: 2009-12-18 10:33:52
        96

        Black-box Property of Cryptographic Hash Functions Michal Rjaˇsko Comenius University in Bratislava Faculty of Mathematics, Physics and Informatics Department of Computer Science

        Add to Reading List

        Source URL: fps2011.dyndns.org

        Language: English
          97

          Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov and Lintao Zhang Microsoft Research, Silicon Valley Campus {mironov,lintaoz}@microsoft.com

          Add to Reading List

          Source URL: research.microsoft.com

          Language: English - Date: 2006-07-23 22:24:46
            98

            Multicollision Attacks on Some Generalized Sequential Hash Functions M. Nandi David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada

            Add to Reading List

            Source URL: www.isical.ac.in

            Language: English - Date: 2011-12-28 03:46:39
              99

              On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions J. Black ∗ M. Cochran ∗

              Add to Reading List

              Source URL: web.cecs.pdx.edu

              Language: English - Date: 2009-09-29 10:07:47
                100

                Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Ahto Buldas1,2,3,⋆ and Sven Laur4,⋆⋆ 1 Cybernetica, Akadeemia tee 21, 12618 Tallinn, Estonia.

                Add to Reading List

                Source URL: lepo.it.da.ut.ee

                Language: English - Date: 2006-03-20 09:54:54
                  UPDATE