Hash functions

Results: 1148



#Item
71Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
72Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English
73Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 07:34:05
74

Cryptanalysis of the MCSSHA Hash Functions Jean-Philippe Aumasson1 and Mar´ıa Naya-Plasencia2 1 2

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:38
    75

    Programmable Hash Functions and Their Applications Dennis Hofheinz1 Eike Kiltz2 March 16, 2011

    Add to Reading List

    Source URL: www.kjdf.de

    Language: English - Date: 2014-06-10 05:37:42
      76

      Analysis of Multivariate Hash Functions Jean-Philippe Aumasson? and Willi Meier?? FHNW, 5210 Windisch, Switzerland Abstract. We analyse the security of new hash functions whose compression function is explicitly defined

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:46:46
        77Cryptography / Key management / Cryptographic hash functions / Feistel cipher / Key stretching / Block cipher / Crypt / Scrypt / Password / Key derivation function / Data Encryption Standard / Key

        Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2014-04-03 12:37:38
        78Cryptography / Cryptographic hash functions / Search algorithms / Key management / Hashing / Scrypt / Salt / Password / Hash function / Crypt / Key derivation function / SHA-2

        TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2014-04-03 12:39:48
        79Cryptography / Key management / Cryptographic hash functions / Key derivation function / PBKDF2 / Password cracking / Password / Key stretching / Salt / Scrypt / Crypt / Key

        The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2015-09-29 12:17:24
        80

        How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? Jean-Philippe Aumasson1∗ and Raphael C.-W. Phan2† 2 1

        Add to Reading List

        Source URL: 131002.net

        Language: English - Date: 2012-08-14 06:46:45
          UPDATE