Hash functions

Results: 1148



#Item
431Cryptographic hash functions / Cryptography standards / Elliptic curve cryptography / SHA-2 / HMAC / PKCS / SHA-1 / Smart card / PCI Express / Cryptography / Cryptographic software / Error detection and correction

TrustWay Crypto PCI: an EAL4+ Common Criteria certified, ANSSI-qualified, cryptographic resource TrustWay® Crypto PCI is a cryptographic solution – 100% developed and manufactured in France by Bull – featuring the l

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2011-05-09 09:52:35
432SHA-1 / SHA-2 / Institute for Applied Information Processing and Communications / RIPEMD / Krypto / Vincent Rijmen / Collision attack / Sha / Cryptographic hash functions / Cryptography / MD4

Analysis of Step-Reduced SHA-256

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-19 06:40:58
433Lisp programming language / ACL2 / Memoization / Lisp / Dynamic programming / Cons / Nqthm / Hash consing / Defun / Computing / Computer programming / Software engineering

Function Memoization and Unique Object Representation for ACL2 Functions Robert S. Boyer

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2007-02-04 12:18:09
434Mathematical logic / Hashing / Crypt / SHA-1 / Cipher / Block cipher / MD4 / Mathematical proof / Cryptography / Mathematics / Cryptographic hash functions

State Of The Art The Result A Proof Outline

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
435Font family / Graphic design / Trigram / Cryptographic hash functions / The quick brown fox jumps over the lazy dog / Typography

Sample of fo:float applications Dropcap by fo:float W

Add to Reading List

Source URL: www.antennahouse.com

Language: English - Date: 2014-09-13 11:39:49
436Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
437Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
438Digital signature / Notary / Full Domain Hash / IP / Random oracle / Cryptography / Public-key cryptography / Cryptographic hash functions

Microsoft PowerPoint - Eurocrypt2012-TightFiatShamir-final.pptx

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:21
439Merkle–Damgård construction / Birthday attack / Hash function / One-way compression function / Preimage attack / Cryptography / Cryptographic hash functions / Message authentication codes

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
440Computing / MD5 / Hashing / Function / Qi / Cryptography / Mathematics / Cryptographic hash functions

A Study of the MD5 Attacks: Insights and Improvements John Black and Martin Cochran University of Colorado Trevor Highland University of Texas

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
UPDATE