Hash functions

Results: 1148



#Item
711Computing / Hashing / MD5 / Suppression list / Search algorithms / Crypt / SHA-1 / SHA-2 / Hash function / Cryptographic hash functions / Cryptography / Email

Microsoft Word - MD5 Suppression List Encryption final[removed]doc

Add to Reading List

Source URL: www.espcoalition.org

Language: English - Date: 2009-04-22 18:33:13
712Crypt / Cryptographic hash functions / Computing / Applied mathematics / Cyberwarfare / Cryptography / Hashing / MD5

Wang’s sufficient conditions of MD5 are not sufficient Jun Yajima and Takeshi Shimoyama FUJITSU LABORATORIES LTD. {jyajima,shimo}@labs.fujitsu.com Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-10 09:35:42
713MD5 / Hashing / Collision attack / SHA-1 / X.509 / Padding / Preimage attack / Hash function / Birthday attack / Cryptography / Error detection and correction / Cryptographic hash functions

Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1 TU Eindhoven, Faculty of Mathematics and Computer Science

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-02-27 05:15:12
714CRYPTREC / Cryptographic hash functions / Differential cryptanalysis / NESSIE / Cryptanalysis / Alternating step generator / Data Encryption Standard / Cryptosystem / Symmetric-key algorithm / Cryptography / Stream ciphers / Block ciphers

RTF Document

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
715Cryptographic hash functions / Stream ciphers / Cryptographic primitive / Symmetric-key algorithm / Block cipher / Key size / Public-key cryptography / Crypt / VEST / Cryptography / Cryptography standards / CRYPTREC

Guidance for Submissions in[removed]Provisional Translation) I n f o r m a t i o n - t e c h n o l o g y P r o m o t i o n A g e n c y, J a p a n Telecommunications Advancement Organization of Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
716MD4 / Hash function / Preimage attack / Provably secure cryptographic hash function / Collision attack / Cryptography / Cryptographic hash functions / MD5

Univerzita Karlova v Praze Matematicko-fyzik´ aln´ı fakulta ´ PRACE ´

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2006-05-03 13:59:43
717Cryptographic hash functions / CRYPTREC / Key management / Pseudorandom number generators / Symmetric-key algorithm / Hierocrypt / Stream cipher / Key size / SHA-2 / Cryptography / Cryptography standards / Block ciphers

Report on Evaluation of Symmetric-Key Cryptographic Techniques May 22, 2003 Toshinobu Kaneko Chair, Symmetric-Key Cryptography Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-03 22:32:58
718Cryptographic hash functions / Electronic Signatures in Global and National Commerce Act / Electronic signature / Digital signature / RSA / Provable security / IEEE P1363 / SHA-1 / Cryptography / Public-key cryptography / CRYPTREC

Report on Present State of ESIGN Signature Evaluation (full evaluation) January 28, 2002 Yasuyuki Sakai, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
719Computing / Cryptographic hash functions / Hashing / SHA-2 / Bouncy Castle / HMAC / SHA-1 / IPsec / Secure Hash Standard / Cryptography / Cryptographic software / Error detection and correction

Bouncy Castle FIPS Java API 4 May[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2014-05-14 07:46:41
720Computing / Information / Data / Oram / CPU cache / Hash list / Hash tree / Hash function / Trie / Hashing / Error detection and correction / Cryptographic hash functions

1 Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.edu

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-08-04 20:04:19
UPDATE