Hash functions

Results: 1148



#Item
41Error detection and correction / Hashing / Cryptographic hash functions / Search algorithms / Malware / Malware analysis / Computer virus / Antivirus software / Hash function / MD5 / Hash list / Crypt

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
42Search algorithms / Hashing / Functions and mappings / Topology / Dynamic perfect hashing / Function / Universal hashing / Hash table / Set / Hash function / Binary relation / Surjective function

Microsoft Word - NLA-monographdoc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-06-14 11:43:50
43NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
44Cryptography / Password / Security / Cryptographic hash functions / Challengeresponse authentication / Crypt / Password cracking / Password policy

Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
45Cryptographic hash functions / Cryptography / NIST hash function competition / Stream ciphers / SHA-3 / Hashing / Sponge function / RadioGatn / Gilles Van Assche / Joan Daemen / Hash function / Random oracle

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 10:37:36
46Cryptographic hash functions / Graz University of Technology / Hashing / Institute for Applied Information Processing and Communications / Error detection and correction / Cryptography / IAIK-JCE

A Case Against Currently Used Hash Functions in RFID Protocols

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-18 01:05:54
47Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
48Cryptography / Cryptographic hash functions / Preimage attack / Advantage / Permutation / Random oracle / Birthday attack

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-07-20 11:55:06
49Hash functions / Hashing / Measure theory / Statistical distance / Data mining / MinHash / Jaccard index / Cluster analysis / Similarity measure / California Codes / C

The Migration of the Field Code Kellen Funk and Lincoln Mullen This paper describes our work in progress for the Digital Humanities Working Group at George Mason University on February 17, 2016. E-mail: lincoln@lincolnmu

Add to Reading List

Source URL: lmullen.github.io

Language: English - Date: 2016-08-13 18:01:55
50NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
UPDATE