Hash functions

Results: 1148



#Item
11

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

Add to Reading List

Source URL: liu.diva-portal.org

- Date: 2013-04-18 05:30:18
    12

    Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions

    Add to Reading List

    Source URL: liu.diva-portal.org

    - Date: 2010-06-16 03:36:14
      13

      Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash Ethan Heilman August 26, 2009 Abstract This paper presents an attack on the strong collision resistance of the Spectral Hash SHA-3 candidate.

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2009-08-26 12:02:39
        14

        Implementing Smooth Projective Hash Functions Advisor(s): David Derler, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

        Add to Reading List

        Source URL: www.iaik.tugraz.at

        - Date: 2015-09-08 06:00:03
          15Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

          GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

          Add to Reading List

          Source URL: www.cryptophone.de

          Language: English - Date: 2009-10-21 09:08:30
          16Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

          The Politics of Cryptography: Bitcoin and The Ordering Machines

          Add to Reading List

          Source URL: iqdupont.com

          Language: English - Date: 2015-12-03 10:50:31
          17Information retrieval / Search algorithms / Information science / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Universal hashing / Locality-sensitive hashing

          Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

          Add to Reading List

          Source URL: www-tcs.cs.uni-sb.de

          Language: English - Date: 2016-03-06 16:06:05
          18Mathematics / Information science / Graph theory / Hashing / Search algorithms / Hash functions / MinHash / Networks / Jaccard index / Nearest neighbor search / Community structure / Graph

          Real-Time Community Detection in Large Social Networks on a Laptop Ben Chamberlain Clive Humby

          Add to Reading List

          Source URL: www.mlgworkshop.org

          Language: English - Date: 2016-08-14 01:22:56
          19Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

          The Politics of Cryptography: Bitcoin and The Ordering Machines

          Add to Reading List

          Source URL: www.iqdupont.com

          Language: English - Date: 2015-12-03 10:50:31
          UPDATE