Hash functions

Results: 1148



#Item
421Computing / File sharing networks / Data management / Software / Information / Hash tree / Bitcoin / Hash list / Peer-to-peer / Hashing / Cryptographic hash functions / Error detection and correction

Storj A Peer-to-Peer Cloud Storage Network Shawn Wilkinson ([removed]) Contributors: Tome Boshevski ([removed]), Josh Brandoff ([removed]), and Vitalik Buterin ([removed])

Add to Reading List

Source URL: storj.io

Language: English - Date: 2014-12-15 17:03:53
422Hashing / Hash function / Optimal asymmetric encryption padding / Crypt / Full Domain Hash / SHA-2 / Lamport signature / Cryptography / Cryptographic hash functions / Search algorithms

Extendable-Output Functions (XOFs) Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:38
423Key management / Electronic commerce / Implicit certificate / SHA-1 / Public key certificate / Hash function / Secure Hash Standard / NIST hash function competition / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
424Key management / Electronic commerce / Implicit certificate / SHA-1 / Public key certificate / Hash function / Secure Hash Standard / NIST hash function competition / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Eoin Buckley ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:09
425Computing / Bitcoin / Peer-to-peer computing / Cryptographic hash functions / Error detection and correction / Proof-of-work system / Cryptographic nonce / Stakeholder / Transmission Control Protocol / Cryptography / Software / Hashing

Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake Iddo Bentov∗ Charles Lee Alex Mizrahi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-11 22:53:58
426Key management / Implicit certificate / Electronic commerce / Hash function / SHA-1 / Collision resistance / Digital signature / Public key certificate / Elliptic curve cryptography / Cryptography / Cryptographic hash functions / Public-key cryptography

Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Certicom Research Contact: Matthew Campagna ([removed])

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:13
427Keccak / NIST hash function competition / SHA-2 / Preimage attack / Merkle–Damgård construction / Crypt / Hash tree / SHA-1 / Secure Hash Standard / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:37
428Random oracle / Oracle machine / Hash function / One-way compression function / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 Center for Information Security Technologies(CIST), Korea Universit

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-03-05 01:27:34
429Oblivious transfer / Models of computation / Randomness / Random oracle / Oracle machine / Advantage / Optimal asymmetric encryption padding / Secure two-party computation / Random function / Cryptography / Cryptographic protocols / Cryptographic hash functions

Extending Oblivious Transfers Efficiently Yuval Ishai1 , Joe Kilian2 , Kobbi Nissim2? , and Erez Petrank1?? 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:56
430Block cipher / Differential cryptanalysis / Tiger / Py / Eli Biham / Advanced Encryption Standard / Cryptanalysis / MD4 / Index of cryptography articles / Cryptography / Cryptographic hash functions / Stream ciphers

FSE 2006 Program Wednesday, March 15th 08:[removed]:50 Registration

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-03-10 16:40:02
UPDATE