Hash functions

Results: 1148



#Item
571SHA-1 / SHA-2 / Differential cryptanalysis / SHACAL / Block cipher / MD5 / Collision attack / Collision resistance / HAVAL / Cryptography / Cryptographic hash functions / Hashing

Cryptographic Hash Workshop[removed]Some applications of the Biham-Chen attack to SHA-like hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:28:42
572Error detection and correction / Search algorithms / Hash function / Merkle–Damgård construction / Preimage attack / Hash list / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
573Internet protocols / Secure communication / Electronic commerce / HMAC / Cipher suite / FIPS 140 / SHA-2 / RSA / Advanced Encryption Standard / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 4g - McAfee NSP V6 1 IPS-NAC SecurityPolicy v1_11_HL2011[removed]Copy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
574Cryptography / Collision resistance / Hash function / Hash list / SHA-2 / Collision / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Hashing

Classification of Hash Functions Suitable for Real-life Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:53:32
575Hash function / MD5 / Collision resistance / SHA-1 / MD4 / RadioGatún / Block cipher / SHA-2 / Collision / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]RFadioGatun, a belt-and-mill hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:22:30
576Wang Xiaoyun / Computer programming / MD5 / Computing / Chaining / Frances Yao / Logic programming / Mathematics / SHA-2 / Cryptographic hash functions / SHA-1 / Behaviorism

Microsoft PowerPoint - SHA1-new-Result-NIST

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:23:36
577SHA-1 / MD5 / Computing / Applied mathematics / MD4 / Hamming weight / Gaussian elimination / Cryptographic hash functions / Mathematics / SHA-2

Gr¨ obner Basis Based Cryptanalysis of SHA-1 Makoto Sugita ∗

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:15:48
578One-way compression function / Hash function / Collision attack / Collision resistance / Provably secure cryptographic hash function / GOST / Cryptographic hash functions / Cryptography / Hashing

A Note on the security proof of Knudsen-Preneel construction of a hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:26:04
579Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction

Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:54:18
580SHA-2 / MD5 / Error detection and correction / Cryptographic hash functions / SHA-1

Cryptographic Hash Workshop[removed]Message Modification, Neutral Bits and Boomerangs: From Which Round Should we Start Counting in SHA?"

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:22:30
UPDATE