Hash functions

Results: 1148



#Item
531Advanced Encryption Standard / Hashing / CRYPTREC / SHA-2 / National Security Agency / SHA-1 / Crypt / NESSIE / Secure Hash Standard / Cryptography / Cryptographic hash functions / Cryptography standards

X-Sieve: CMU Sieve[removed]Subject: Hash Algorithm Requirements and Evaluation Criteria. Date: Tue, 24 Apr[removed]:33:[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:18:28
532Hashing / SHA-1 / MD5 / Collision attack / Hash function / HMAC / Collision / MD2 / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Malicious Hashing: Eve’s Variant of SHA-1 Ange Albertini1 , Jean-Philippe Aumasson2 , Maria Eichlseder3 , Florian Mendel3 , and Martin Schl¨affer3 1 Corkami, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 12:54:02
533Hashing / World Wide Web / Cryptographic hash functions / Real-time web / Cross-platform software / Twitter / TweetDeck / Hash function / Hash list / Error detection and correction / Computing / Software

Twitter Chat & Tour Q&A Q? How do I get started? A: First of all you must have a Twitter account, (go to twitter.com). When a chat/tour is set up a hash tag (#) is assigned. To follow the chat/tour go to your Twitter ho

Add to Reading List

Source URL: www.bannerhealth.com

Language: English - Date: 2014-11-29 00:04:21
534Preimage attack / GOST / SHA-1 / MD5 / SHA-2 / Hash function / Hash table / Function / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-29 21:47:28
535Crypt / RadioGatún / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hash function

X-Sieve: CMU Sieve 2.2 Subject: Comments on Hash Function Criteria Date: Fri, 27 Apr[removed]:28:[removed]X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: Comments on Hash Function Criteria

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:24:16
536SHA-2 / Computing / Cryptographic hash functions / CTC / SHA-1

JANUARY 2014 CTC PROJECT ALLOCATION LIST Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: dot.ca.gov

Language: English - Date: 2014-01-31 16:02:39
537CRYPTREC / Collision resistance / Random oracle / Preimage attack / HMAC / Hash function / Crypt / Outline of cryptography / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:08:26
538Error detection and correction / Message authentication codes / Search algorithms / HMAC / Hash function / Collision / Digital signature / Algorithm / SHA-2 / Cryptography / Hashing / Cryptographic hash functions

Comments on NIST Draft Requirements and Criteria for Hash Algorithm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:56:14
539Hashing / SHA-1 / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Search algorithms

X-Sieve: CMU Sieve 2.2 DKIM-Signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:mimeversion:content-type; b=hpQBvkv1eVIC20ITx1GF9QzMkMgj4

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:59:50
540Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:33
UPDATE