Hash functions

Results: 1148



#Item
231Merkle–Damgård construction / SHA-1 / Collision resistance / MD5 / Collision attack / MDC-2 / Preimage attack / Hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Cryptography / One-way compression function

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
232Proof of knowledge / Finite fields / IP / Zero-knowledge proof / Random oracle / NP / XTR / MQV / Cryptography / Cryptographic protocols / Cryptographic hash functions

An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption J. Wu∗ and D.R. Stinson† David R. Cheriton School of Computer Science University of Waterloo, Waterloo, ON, Canada {j32wu, dstinson}@uwate

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-15 09:30:41
233Block cipher / Function / MD5 / Hashing / GOST / Mathematics / Cryptographic hash functions / Feistel cipher

F-HASH: Securing Hash Functions Using Feistel Chaining Duo Lei Department of Science, National University of Defense Technology, Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-20 23:47:47
234Pseudorandomness / Computational complexity theory / Randomness / Hashing / Pseudorandom generator theorem / Pseudorandom generator / One-way function / Hard-core predicate / Cryptographic hash function / Cryptography / Theoretical computer science / Applied mathematics

Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-10 11:39:44
235MD2 / SHA-2 / SHA-1 / Computer programming / Md5sum / Software / Binary file / Crypt / Cryptographic hash functions / Computing / MD5

Perl versiondocumentation - Digest::file NAME Digest::file - Calculate digests of files SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:24:19
236Computing / Cryptographic hash functions / Hashing / SHA-2 / Internet protocols / HMAC / Bouncy Castle / SHA-1 / IPsec / Cryptography / Error detection and correction / Cryptographic software

Bouncy Castle FIPS Java API 1 MayIntroduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-05-08 17:24:41
237Internet protocols / Password / Challenge-response authentication / Inter-Asterisk eXchange / MD5 / Replay attack / Man-in-the-middle attack / Computer network security / Cryptographic hash functions / Computer security / Cryptography / Cyberwarfare

iSEC Security Whitepaper IAX Voice Over-IP Security 1 Written by Zane Lackey and Himanshu Dwivedi iSEC Partners is a information security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
238Hash function / Cryptographic hash functions / Information retrieval / Artificial intelligence / Cyberwarfare / Cryptography / Hashing / Error detection and correction

COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:42
239System software / Cryptographic software / Secure Shell / Telnet / SHA-2 / SHA-1 / Cryptographic hash functions / Computing / Internet

Release Notes - Version

Add to Reading List

Source URL: www.georgiasoftworks.com

Language: English - Date: 2014-11-17 16:33:02
240Cryptographic hash functions / Error detection and correction / File sharing networks / Computer programming / Hash tree / Distributed hash table / Kademlia / Hash list / BitTorrent / Distributed data storage / Hashing / Computing

IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet ABSTRACT

Add to Reading List

Source URL: static.benet.ai

Language: English - Date: 2014-07-24 07:13:01
UPDATE