Hash functions

Results: 1148



#Item
441SHA-1 / Collision / Krypto / Institute for Applied Information Processing and Communications / Cryptographic hash functions / DC Comics / 2J

Microsoft PowerPoint - Pramstaller_CarryImpactSHA1_v13_topublish.ppt

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-20 04:40:59
442Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
443Cryptographic hash functions / HMAC / SHA-1 / MD5 / Collision attack / Hash function / MD4 / Collision resistance / SHA-2 / Error detection and correction / Cryptography / Hashing

Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb

Add to Reading List

Source URL: www.jucs.org

Language: English - Date: 2008-09-17 07:43:00
444CTC / SHA-2 / Computer programming / C / Computing / Cryptographic hash functions / Software engineering

Microsoft Word - CTC September Project Allocations List.docx

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2012-02-22 15:50:47
445Computing / Information / Cryptographic hash functions / Error detection and correction / Hash table / Hash function / Trie / Lookup table / Secure multi-party computation / Hashing / Search algorithms / Cryptography

Fast Privacy-Preserving Top-𝑘 Queries using Secret Sharing (Invited Paper) Martin Burkhart Xenofontas Dimitropoulos

Add to Reading List

Source URL: sepia.ee.ethz.ch

Language: English - Date: 2011-01-06 04:06:32
446SHA-2 / Computing / Cryptographic hash functions / CTC / SHA-1

JANUARY 2014 CTC PROJECT ALLOCATION LIST Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-01-30 15:55:59
447Computing / Software / Bitcoin / Peer-to-peer computing / Cryptography / Dwolla / Hashing / Cryptographic hash functions / Error detection and correction

FEATURE BITCOIN What in the name of Zeus is it? Bitcoin is a digital currency that became popular in[removed]It’s not controlled by governments, banks, or anyone. It’s a decentralised

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2014-11-12 07:51:25
448Vectors / Functions and mappings / Functional languages / R / Function / Hash function / Vector space / Ggplot2 / Matrix / Algebra / Mathematics / Linear algebra

PDF Document

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-29 07:14:56
449Electronic commerce / RSA / Digital signature / Full Domain Hash / Hash function / XTR / Oracle machine / Random oracle / Prime number / Cryptography / Public-key cryptography / Cryptographic hash functions

Security Proof for Partial-Domain Hash Signature Schemes Jean-S´ ebastien Coron Gemplus Card International

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
450Relational database management systems / Cryptographic hash functions / Query languages / Computer network security / Password / Rainbow table / LM hash / Microsoft SQL Server / Adaptive Server Enterprise / Computing / Computer security / Cryptography

White Paper Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-14 14:17:40
UPDATE