Hash functions

Results: 1148



#Item
631Cryptographic hash functions / Key management / Time / Code signing / Public key certificate / Timestamp / SHA-2 / SHA-1 / PKCS / Cryptography / Public-key cryptography / Electronic commerce

Entrust Certificate Services Authenticode Signing User Guide

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-06-13 14:10:10
632Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
633HMAC / Hashing / Advantage / Pseudorandom function family / Function / Information theory / Random oracle / Cryptography / Message authentication codes / Cryptographic hash functions

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37
634Cryptographic hash functions / Entropy / Information theory / Ring signature / Lamport signature / Advantage / Digital signature / Random oracle / XTR / Cryptography / Public-key cryptography / Randomness

Signature Schemes with Bounded Leakage Resilience Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:06:47
635Cryptographic hash functions / Data Encryption Standard / Advanced Encryption Standard / Symmetric-key algorithm / Key size / FIPS 140-2 / Block cipher / SHA-2 / Message authentication code / Cryptography / Key management / Cryptography standards

ITS-SEC-01 Data Encryption and Cryptography

Add to Reading List

Source URL: oit.ohio.gov

Language: English - Date: 2010-03-08 12:44:45
636Error detection and correction / Search algorithms / Hash function / Hash tree / Hash list / SHA-1 / SHA-2 / Trie / Hash chain / Cryptographic hash functions / Cryptography / Hashing

Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas1 , Ahto Truu1 , Risto Laanoja1 , and Rainer Gerhards2 1 Guardtime AS, Tallinn, Estonia {ahto.buldas,ahto.truu,risto.laanoja}@guardtime.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-15 10:18:50
637Cryptographic hash functions / Blacksmith / SHA-1

11066_Cobra_Catalogue_DP.indd

Add to Reading List

Source URL: delcowindows.com

Language: English - Date: 2013-06-03 22:03:36
638Error detection and correction / Cryptographic hash functions / Fault-tolerant computer systems / Software / Bitcoin / Hash tree / Proof-of-work system / Consensus / Peer-to-peer / Computing / Cryptography / Hashing

Filecoin: A Cryptocurrency Operated File Storage Network 1e96a1b27a6cb85df68d728cf3695b0c46dbd44d filecoin.io July 15, 2014 Abstract Filecoin is a distributed electronic currency similar to Bitcoin. Unlike Bitcoin’s co

Add to Reading List

Source URL: filecoin.io

Language: English - Date: 2014-07-18 23:17:17
639Cryptography / Search algorithms / Image processing / Cryptographic hash functions / Watermark / Watermarking / Hash function / Singular value decomposition / JPEG / Algebra / Mathematics / Hashing

Appl. Math. Inf. Sci. 6 No. 2S pp. 643S-650S[removed]Applied Mathematics & Information Sciences An International Journal © 2012 NSP

Add to Reading List

Source URL: www.naturalspublishing.com

Language: English - Date: 2013-04-02 22:57:06
640Cyberwarfare / RockYou / Rainbow table / Crypt / Salt / MD5 / Security / Cryptography / Password / Cryptographic hash functions

Designing Secure Systems that People Can Use

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-02-12 16:51:10
UPDATE