Hash functions

Results: 1148



#Item
661Hashing / NIST hash function competition / MD5 / Hash function / HMAC / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Competition - Round 2: Official Comments-BMW

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:12:20
662Public-key cryptography / One-way function / Trapdoor function / Password-authenticated key agreement / Random oracle / PP / NP / Oracle machine / RSA / Cryptography / Cryptographic protocols / Cryptographic hash functions

J. Cryptology[removed]OF1–OF35 DOI: [removed]s00145[removed] © 2006 International Association for Cryptologic Research Trapdoor Hard-to-Invert Group

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
663Collision / Hash function / Information retrieval / Artificial intelligence / Computing / Cryptographic hash functions / Hashing / Search algorithms

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:46:46
664Hashing / Preimage attack / HMAC / Hash function / Collision attack / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

Re: OFFICIAL COMMENT: LUX

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:14:50
665NIST hash function competition / Edon /  Ohio / Espionage / Cyberwarfare / Security / Cryptographic hash functions / Cryptography / Preimage attack

outbind://214-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A04

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:45:08
666SHA-1 / Crypt / VEST / Tiger / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:45:52
667SHA-1 / Cryptography / Abstraction / Security / Computer security / Password cracking / Cryptographic hash functions / Password / Crypt

CALIFORNIA STATE SCIENCE FAIR 2013 PROJECT SUMMARY Name(s) Sohil Bammi; Brandon Betkolia; Eric Zhou

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2013-04-13 17:38:40
668Cryptographic hash functions / Md5deep / Public domain software / Md5sum / MD5 / GNU Core Utilities / Dd / Kornblum / DAR / Software / System software / Computing

Microsoft PowerPoint - Open Source in Computer Forensics.ppt

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-01-16 06:12:25
669Hashing / Cryptographic hash functions / Search algorithms / Md5deep / Public domain software / Hash function / MD5 / Crypt / Rsync / Error detection and correction / Computing / Software

ManTech SMA Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-01-16 06:43:39
670Stefan Lucks / Aurora / Hash function / Collision / Cryptography / Cryptographic hash functions / Hashing

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 11:52:26
UPDATE