Hash functions

Results: 1148



#Item
211Computer programming / Mathematics / Hashing / Search algorithms / Error detection and correction / Space–time tradeoff / CPU cache / Dynamic random-access memory / Hash function / Computing / Software optimization / Computer memory

Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov University of Luxembourg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 04:22:19
212MD5 / Padding / SHA-1 / RSA / Abstract Syntax Notation One / Cryptography / Cryptographic hash functions / Public-key cryptography

TargetCollidingCertificatesTech

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-10-26 18:40:33
213PBKDF2 / Password / Salt / Crypt / LastPass Password Manager / SHA-2 / Bcrypt / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Cryptographic software

Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:18:45
214Hashing / MD5 / SHA-1 / MD4 / RIPEMD / Crypt / Padding / Digital signature / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Contents I Table of Contents Part I Introduction

Add to Reading List

Source URL: www.bytefusion.com

Language: English - Date: 2007-05-31 21:17:32
215Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
216Cyberwarfare / Rainbow table / Password / SHA-2 / Crypt / Password strength / LM hash / Cryptography / Cryptographic hash functions / Computer security

CIS 331 Introduction to Networks & Security February 6, 2014 Homework 2: Authentication

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
217Notary / Cryptographic hash functions / Digital signature / Public key certificate / SHA-1 / Cryptography / Public-key cryptography / Key management

Sadikhov Certification Digital Signature Verification 1. Open the certification pdf file with a related pdf opener such as adobe acrobat readerYou can find a digital signature at the bottom of the certification w

Add to Reading List

Source URL: www.sadikhov.com

Language: English - Date: 2010-08-09 21:13:00
218Hashing / MD5 / HMAC / Collision attack / SHA-2 / Padding / SHA-1 / Merkle–Damgård construction / Crypt / Error detection and correction / Cryptography / Cryptographic hash functions

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
219Search algorithms / Hashing / Preimage attack / Merkle–Damgård construction / Hash function / Alexander Sotirov / Cryptographic hash functions / Cryptography / MD5

MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-26 13:48:46
220Scripting languages / Cross-platform software / GNU readline / Perl / Newline / Command-line interface / Regular expression / Hash function / Form / Computing / Software / User interface techniques

Perl versiondocumentation - Term::ReadLine NAME Term::ReadLine - Perl interface to various readline packages. If no real package is found, substitutes stubs instead of basic functions.

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:09:39
UPDATE