Hash functions

Results: 1148



#Item
411Hashing / SHA-2 / Hash function / HMAC / Endianness / Preimage attack / Padding / Collision attack / GOST / Error detection and correction / Cryptography / Cryptographic hash functions

Cryptographic Hash Function E DON - R Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2009-02-11 09:26:04
412Hashing / MD5 / Merkle–Damgård construction / Hash function / Preimage attack / Collision / Crypt / One-way compression function / Tiger / Cryptography / Cryptographic hash functions / Error detection and correction

Collisions in MD5 Antoine Delignat-Lavaud Collisions in MD5 ... and how to use them for fun and profit.

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2010-08-17 15:48:58
413Hashing / Message authentication codes / Search algorithms / Preimage attack / HMAC / Collision resistance / MD5 / CBC-MAC / Universal hashing / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic hashing Non-keyed hash functions u Two families of hash functions: 1. Non-keyed hash functions:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-14 14:59:32
414Computing / MD5 / SHA-2 / Computer virus / Filename extension / SHA-1 / Data / Information / Cryptographic hash functions / Antivirus software / Malware

          Research Brief

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-01-17 07:02:56
415Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: gauss.ececs.uc.edu

Language: English - Date: 2010-06-01 13:28:51
416Search algorithms / Cryptography / Academia / Knowledge / Neil Gershenfeld / Year of birth missing / Hash function / Doctorate / Professor / Hashing / Education / Cryptographic hash functions

1 Physical One-Way Functions by Pappu Srinivasa Ravikanth

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:03
417Computer security / Cryptographic hash functions / OpenSSL / Open Source Software Institute / FIPS 140-2 / FIPS 140 / SHA-1 / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic software

OpenSSL FIPS Object Module Version[removed]By the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: openssl.org

Language: English - Date: 2007-02-06 16:03:20
418Information retrieval / Information science / Artificial intelligence / Error detection and correction / Hash function / Hash table / Collision / Bin / Query optimizer / Hashing / Search algorithms / Cryptographic hash functions

Noname manuscript No. (will be inserted by the editor) Streaming Multiple Aggregations Using Phantoms Rui Zhang · Nick Koudas · Beng Chin Ooi · Divesh Srivastava · Pu Zhou

Add to Reading List

Source URL: www.ruizhang.info

Language: English - Date: 2010-02-03 20:09:19
419Information science / Information retrieval / Artificial intelligence / Hash table / Cryptographic hash functions / Hash function / Trie / CPU cache / Hash list / Search algorithms / Hashing / Error detection and correction

CITI Technical Report 00-1 Linux Kernel Hash Table Behavior: Analysis and Improvements Chuck Lever, Sun-Netscape Alliance

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2000-05-03 13:54:06
420NIST hash function competition / Keccak / Hashing / Search algorithms / Joan Daemen / SHA-1 / MD5 / Hash function / Universal quantification / Error detection and correction / Cryptographic hash functions / Cryptography

Keccak and SHA-3: code and standard updates Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: fosdem.org

Language: English - Date: 2015-02-18 08:01:24
UPDATE