Hash functions

Results: 1148



#Item
541Search algorithms / Hash function / Information retrieval / Artificial intelligence / Information science / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

X-Sieve: CMU Sieve 2.2 From: Tolga Acar To: "hash-function@nist.gov" CC: Brian LaMacchia Date: Fri, 27 Apr 2007 15:44:15 -0700 Subject: Has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:55:18
542Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:36
543Hashing / Crypt / Hash function / SHA-2 / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Fri, 13 Apr 2007 15:43:28 +0300 From: Carmi Gressel Subject: Hash Algorithm Requirements and Evaluation Criteria To: william.burr@nist.gov, hash-function@nist.gov X-Mai

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:27:14
544Electronic commerce / Identity management / Credential / SHA-2 / Proof of knowledge / Pseudorandom number generator / RSA / SHA-1 / Cryptography / Cryptographic hash functions / Cryptographic protocols

Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards⋆ Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers Radboud University Nijmegen, ICIS DS, Nijmegen, The Netherlands {a.delapiedra,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 05:32:30
545Error detection and correction / Data quality / Hash function / Digital continuity / Digital preservation / Crypt / Digital signature / Fingerprint / Hash list / Cryptography / Hashing / Cryptographic hash functions

Microsoft Word - DigitalContinuityHandout_NAGARA Judicial Records Forum

Add to Reading List

Source URL: nagara.org

Language: English - Date: 2014-06-06 16:31:44
546Error detection and correction / Search algorithms / Hash chain / Lamport signature / Hash function / Password / Hash tree / Hash / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new ideas for decre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 05:03:49
547Hashing / Merkle–Damgård construction / Hash function / Collision resistance / Crypt / Block cipher / Information retrieval / Computing / Artificial intelligence / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Tue, 13 Mar 2007 01:50:24 +0100 (CET) From: Orr Dunkelman To: hash-function@nist.gov Subject: A comment to NIST regarding the Hash function Competition X-Viru

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:52
548Cryptographic hash functions / Road surface / Road / SHA-2 / Kentucky Route 9 / Shoulder / Traffic light / Transport / Land transport / Road transport

CTC PROJECT ALLOCATIONS LIST AUGUST[removed]Project # Allocation Amount Recipient RTPA/CTC

Add to Reading List

Source URL: www.caltrans.ca.gov

Language: English - Date: 2014-08-21 16:39:46
549Kryptonians / SHA-1 / Institute for Applied Information Processing and Communications / DC Comics / Cryptographic hash functions / Krypto

Finding SHA-1 Characteristics

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:14:58
550Hashing / SHA-2 / SHA-1 / Search algorithms / Crypt / Secure Hash Standard / NIST hash function competition / Collision attack / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

[Federal Register: September 12, 1997 (Volume 62, Number 177)]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:13:28
UPDATE