Hash functions

Results: 1148



#Item
61

Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their design

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:39
    62

    Cryptanalysis of the ESSENCE Family of Hash Functions? Nicky Mouha1,2,?? , Gautham Sekar1,2,? ? ? , Jean-Philippe Aumasson3,† , Thomas Peyrin4 , Søren S. Thomsen5 , Meltem S¨onmez Turan6 , and Bart Preneel1,2 1 5

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:42
      63Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

      Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

      Add to Reading List

      Source URL: www.estv.admin.ch

      Language: English
      64

      Analysis of multivariate hash functions Jean-Philippe Aumasson, Willi Meier 3xy 2 + zt

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:46:52
        65Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Hash function / SHA-2 / Password / SHA-1 / Salt / MD5 / Crypt

        Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2015-02-03 09:25:05
        66

        Perfectly One-Way Probabilistic Hash Functions (Preliminary Version) Ran Canetti∗ Daniele Micciancio†

        Add to Reading List

        Source URL: omereingold.files.wordpress.com

        Language: English - Date: 2014-10-21 18:21:58
          67

          Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

          Add to Reading List

          Source URL: cseweb.ucsd.edu

          Language: English - Date: 2005-03-01 14:19:32
            68Cryptography / Cryptographic hash functions / Hashing / Cryptographic software / Key management / Crypt / Scrypt / SHA-2 / Password / Hash function / PBKDF2 / Salt

            Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

            Add to Reading List

            Source URL: password-hashing.net

            Language: English - Date: 2014-10-16 08:19:35
            69Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

            Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

            Add to Reading List

            Source URL: password-hashing.net

            Language: English - Date: 2014-04-14 07:18:05
            UPDATE