Hash functions

Results: 1148



#Item
551Keccak / Hashing / Block ciphers / Joan Daemen / Threefish / Skein / Fugue / Bart Preneel / Crypt / Cryptography / NIST hash function competition / Cryptographic hash functions

The Second SHA-3 Candidate Conference Accepted Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:50:30
552Hash function / Collision attack / Birthday attack / Collision / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Preimage attack

Multicollision Attacks on Some Generalized Sequential Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:57:26
553Cryptographic hash functions / SHA-2

PDF Document

Add to Reading List

Source URL: resources.ca.gov

Language: English - Date: 2014-07-30 16:03:18
554Message authentication codes / HMAC / Internet protocols / Cryptographic hash functions / Cryptographic protocols / Collision attack / MD4 / MD5 / SHA-1 / Cryptography / Error detection and correction / Hashing

Forgery and Partial Key Recovery attacks on HMAC and NMAC using Hash Collisions 2nd NIST Hash Function Workshop Scott Contini Macquarie University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:27:16
555Cryptographic hash functions / Block ciphers / Advanced Encryption Standard / Keccak / Threefish / Skein / Joan Daemen / Grøstl / Crypt / Cryptography / NIST hash function competition / Error detection and correction

The Second SHA-3 Candidate Conference August 23-24, 2010 University of California, Santa Barbara [Corwin Pavilion] Zip files of the presentations and papers are now available. First Day

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 14:27:39
556Hashing / Hash function / Merkle–Damgård construction / Information retrieval / Artificial intelligence / Applied mathematics / Provably secure cryptographic hash function / Collision resistance / Cryptographic hash functions / Cryptography / Search algorithms

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:57:42
557Hashing / SHA-2 / SHA-1 / Collision attack / MD4 / HMAC / RadioGatún / Preimage attack / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Error detection and correction

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:08:30
558Collision / Cyberwarfare / Computing / Computer programming / Cryptographic hash functions / Hashing / MD5

Precise Probabilities for Hash Collision Paths

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:06:26
559Universal one-way hash function / SHA-1 / SHA-2 / Hash function / Hash list / Cryptographic primitive / Collision / MD5 / One-way function / Cryptographic hash functions / Error detection and correction / Cryptography

1 Q2S Edon-R, An Infinite Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:38:20
560Group theory / Ramanujan graph / Spectral theory / Srinivasa Ramanujan / Graph / Elliptic curve / Modular group / Graph theory / Mathematics / Analytic number theory

Cryptographic hash functions from expander graphs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:42:34
UPDATE