Hash functions

Results: 1148



#Item
101Cryptographic hash functions / Cryptography / Hashing / Information retrieval / Error detection and correction / Applied mathematics / SHA-2 / Merkle tree / SHA-1 / Hash list / Baseball at the 2013 East Asian Games / Baseball at the 2007 Southeast Asian Games

On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:30:51
102Cryptography / Password / Security / Cryptographic hash functions / Salt / Random password generator / Passwd / Crypt / Dictionary attack / Password strength / OTPW

A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

Add to Reading List

Source URL: www.findravi.com

Language: English - Date: 2009-04-03 23:54:54
103

Simple and Space-Efficient Minimal Perfect Hash Functions ⋆ Fabiano C. Botelho1 , Rasmus Pagh2 and Nivio Ziviani1

Add to Reading List

Source URL: cmph.sourceforge.net

Language: English - Date: 2012-03-21 00:30:01
    104Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Hash function / Hash table / RSA / Crypt / Block cipher / Universal hashing / Scrypt

    STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

    Add to Reading List

    Source URL: www.daemonology.net

    Language: English - Date: 2009-06-11 07:29:01
    105

    Full Cryptanalysis of LPS and Morgenstern Hash Functions Christophe Petit1? , Kristin Lauter2 and Jean-Jacques Quisquater1?? 1 UCL Crypto Group? ? ? , 2 Microsoft Research.

    Add to Reading List

    Source URL: www.uclouvain.be

    Language: English - Date: 2011-12-14 05:30:36
      106Cryptographic hash functions / NIST hash function competition / SHA-3

      SHA-3 Conference, February 2009, Shabal

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-06-05 11:30:32
      107Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

      SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

      Add to Reading List

      Source URL: nvlpubs.nist.gov

      Language: English - Date: 2015-08-04 11:34:10
      108

      A Survey of Recent Cryptanalysis on Hash Functions Yu Sasaki NTT Corporation 30/AugASK 2011@NTU 1

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English - Date: 2012-03-13 12:15:13
        109Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

        FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

        Add to Reading List

        Source URL: nvlpubs.nist.gov

        Language: English - Date: 2015-08-04 11:33:21
        110

        Characterizing Padding Rules of MD Hash Functions Preserving Collision Security Mridul Nandi National Institute of Standards and Technology

        Add to Reading List

        Source URL: www.isical.ac.in

        Language: English - Date: 2011-12-28 03:46:39
          UPDATE