Hash functions

Results: 1148



#Item
591Hash function / MD5 / MD4 / N-Hash / Lattice problem / NIST hash function competition / Trie / SHA-2 / Collision resistance / Cryptographic hash functions / Cryptography / SHA-1

Cryptographic Hash Workshop[removed]LASH

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:05:04
592Error detection and correction / SHA-2 / SHA-1 / MD5 / Digital signature / Hash list / Hash function / Trusted timestamping / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

Long-lived digital integrity using short-lived hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:39:50
593Cryptographic hash functions / Concrete / Highways / Road / SHA-2 / Asphalt concrete / Transport / Land transport / Road transport

CTC Financial Vote List 2.5 June 25, 2014 Highway Financial Matters

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-08-07 19:33:47
594Thue–Morse sequence / Mathematics / Fixed points / Sequence

Abelian Square-Free Dithering for Iterated Hash Functions Ronald L. Rivest

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:01:20
595One-way compression function / Collision resistance / Quasigroup / Hash function / SHA-2 / SHA-1 / Collision attack / Collision / MD5 / Cryptographic hash functions / Cryptography / Preimage attack

Cryptographic Hash Workshop[removed]Edon-R Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:31:50
596Hashing / Hash function / Applied mathematics / Truncation / SHA-2 / Mathematics / Artificial intelligence / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Search algorithms

SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:30:12
597Collision attack / SHA-1 / MD5 / Collision resistance / SHA-2 / Hash function / RIPEMD / Birthday attack / Collision / Cryptographic hash functions / Cryptography / MD4

A Proposal of a criterion for collision resistance of hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:25:02
598Hashing / Error detection and correction / Hash function / Computing / SHA-1 / Computer programming / Bit array / Information retrieval / Cryptographic hash functions / Cryptography / Search algorithms

Cryptographic Hash Workshop[removed]LASH Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:05:44
599Cryptography standards / Hashing / Cryptographic hash functions / Advanced Encryption Standard / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Error detection and correction / Cryptographic software

Microsoft Word - 05a - Security_Policy_Model-Open SSL_HP-_Ver1 0r4_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
600Merkle–Damgård construction / Random oracle / Optimal asymmetric encryption padding / Oracle machine / SWIFFT / Cryptography / Cryptographic hash functions / Advantage

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:58:50
UPDATE