Hash functions

Results: 1148



#Item
391Hashing / Search algorithms / Hash function / Preimage attack / SHA-1 / Collision attack / HMAC / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Error detection and correction

Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-04 14:03:01
392Cryptographic hash functions / Computing / FIPS 140 / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptography standards

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:41:33
393Hashing / Randomness / Information theory / Search algorithms / Entropy / SHA-2 / Hash function / HMAC / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions Danilo Gligoroski1 and Vlastimil Klima2 1 Faculty of Information Technology, Mathematics and Electrical Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-07-31 05:53:00
394Advanced Encryption Standard / Ciphertext / Cryptographic hash functions / Stream ciphers / One-way compression function / Cryptography / Block cipher / Transposition cipher

Microsoft Word - DN_HDN_EN.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-14 11:21:26
395Hashing / Error detection and correction / Hash function / Collision attack / Padding / Espionage / Cyberwarfare / Information retrieval / Cryptographic hash functions / Cryptography / Search algorithms

formát Název-moje šablona pro docy

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-11-18 20:27:25
396NIST hash function competition / Hash function / Rotational cryptanalysis / Cryptanalysis / Threefish / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

Add to Reading List

Source URL: people.item.ntnu.no

Language: English - Date: 2010-11-15 08:00:24
397Computing / SHA-2 / Hash function / Endianness / Preimage attack / Bit array / Hexadecimal / MD5 / GOST / Error detection and correction / Cryptography / Cryptographic hash functions

Cryptographic Hash Function B LUE M IDNIGHT W ISH Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: people.item.ntnu.no

Language: English - Date: 2009-09-10 07:24:20
398SHA-1 / Preimage attack / MD5 / MD4 / Padding / RIPEMD / Collision attack / Birthday attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2

On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com Abstract.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-22 14:38:17
399Merkle–Damgård construction / Information retrieval / Artificial intelligence / Computing / Cryptographic hash functions / NIST hash function competition / Hash function

1 Cryptographic Hash Function EDON-R Presented by Prof. Danilo Gligoroski

Add to Reading List

Source URL: csrc.nist.gov

Language: English
400Cryptographic hash functions / Hashing / Cryptographic protocols / MD4 / Internet protocols / Secure communication / HMAC / MD5 / MD2 / Cryptography / Error detection and correction / Computing

Internet Engineering Task Force (IETF) Request for Comments: 6150 Obsoletes: 1320 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-03-06 21:43:52
UPDATE