Hash functions

Results: 1148



#Item
831NIST hash function competition / Hashing / SHA-1 / SHA-2 / Keccak / Skein / Cryptanalysis / Joan Daemen / Hash list / Error detection and correction / Cryptographic hash functions / Cryptography

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-08-27 16:55:35
832SHA-1 / NIST hash function competition / SHA-2 / Keccak / Grøstl / ECRYPT / Crypt / RIPEMD / Tiger / Cryptographic hash functions / Error detection and correction / Cryptography

ICT[removed]ECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information Society Technologies

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-18 12:34:52
833Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / ARIA / Grøstl / SHA-2 / Galois/Counter Mode / NIST hash function competition / Cryptography / Cryptographic hash functions / Whirlpool

Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob Markku-Juhani O. Saarinen Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-07-16 03:56:34
834Advantage / ICE / Quantum information science / Cryptographic hash functions / Quantum circuit / Pseudorandom generator theorem / Cryptography / Computational complexity theory / T-function

Distinguishing Attacks on T-functions Simon K¨ unzli1 , Pascal Junod2 , and Willi Meier1 1 2

Add to Reading List

Source URL: www.simonfischer.ch

Language: English - Date: 2008-01-28 11:18:20
835MD4 / MD5 / Collision attack / RIPEMD / Venti / Hash function / Wang Xiaoyun / SHA-2 / Cryptographic hash functions / Cryptography / SHA-1

Finding Collisions in the Full SHA-1 Xiaoyun Wang1? , Yiqun Lisa Yin2 , and Hongbo Yu3 1 2

Add to Reading List

Source URL: www.impic.org

Language: English - Date: 2006-05-30 13:46:28
836Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
837Functions and mappings / Fourier analysis / Keccak / NIST hash function competition / Function / ICE / Block cipher / Advanced Encryption Standard / Convolution / Mathematics / Mathematical analysis / Cryptography

CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions Markku-Juhani O. Saarinen Kudelski Security, Switzerland [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-12-12 12:39:27
838GOST / NIST hash function competition / Hashing / Keccak / Advanced Encryption Standard / OpenSSL / Block cipher / Data Encryption Standard / ARIA / Cryptography / GOST standards / Cryptographic hash functions

S TRI B OB : Authenticated Encryption from GOST R[removed]LPS Permutation (Extended Abstract) Markku-Juhani O. Saarinen ∗ Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-05-31 01:59:06
839SHACAL / RC6 / RC5 / SHA-1 / SHA-2 / NESSIE / Crypt / Outline of cryptography / Encryption by date / Cryptography / Block ciphers / Cryptographic hash functions

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Add to Reading List

Source URL: ccc.ustc.edu.cn

Language: English - Date: 2006-10-24 07:55:02
840Cryptographic hash functions / Electronic commerce / SHA-1 / SHA-2 / Public key certificate / Public key infrastructure / Sha / Cryptography / Public-key cryptography / Key management

Status Update for DTrade PKI/SHA-256 Digital Certificate Upgrade Industry Notice: DTrade PKI/SHA-256 Digital Certificates DDTC is upgrading the DTrade system to ensure compliance with the use of Access Certificates for E

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2013-11-12 10:52:02
UPDATE