Hash functions

Results: 1148



#Item
121Cryptography / Hashing / Error detection and correction / Cryptographic hash functions / Search algorithms / Commitment scheme / Hash function / Coin flipping / RSA / Crypt

Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-03-01 16:01:06
122

Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

Add to Reading List

Source URL: www5.rz.rub.de

Language: English - Date: 2012-07-23 07:34:30
    123

    . . Security Reductions of Cryptographic Hash Functions .

    Add to Reading List

    Source URL: web.spms.ntu.edu.sg

    Language: English - Date: 2012-03-13 12:15:13
      124Information retrieval / Hashing / Information science / Search algorithms / Error detection and correction / Cryptography / Cryptographic hash functions / Arrays / Hash table / Hash function / Hash list / Hash

      Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗

      Add to Reading List

      Source URL: www.stat.washington.edu

      Language: English - Date: 2010-03-17 13:23:00
      125Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

      Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-09-24 10:22:35
      126Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

      Introduction MD New Results I

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2008-09-27 14:59:29
      127Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

      The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2007-03-29 16:18:56
      128

      Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English - Date: 2012-08-24 06:11:58
        129Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

        How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

        Add to Reading List

        Source URL: www.anf.es

        Language: English - Date: 2014-05-12 07:16:17
        130

        A SAT-based preimage analysis of reduced KECCAK hash functions August 5, 2010 Pawel Morawiecki1 and Marian Srebrny2 1

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2010-10-19 10:06:41
          UPDATE