Hash functions

Results: 1148



#Item
861Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: bitcoin.org

Language: English - Date: 2014-07-01 15:32:51
862Spam filtering / Computer security / Hash function / Computing / Cyberwarfare / Proof-of-work system / Search algorithms / Email authentication / Hashcash

Hashcash - Amortizable Publicly Auditable Cost-Functions Adam Back e-mail: [removed] 1st August 2002 Abstract We present a distributed efficiently amortizable CPU cost-function with no trap–door. The absence

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2005-01-15 19:23:55
863Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: franksz.files.wordpress.com

Language: English - Date: 2013-02-12 17:26:35
864Error detection and correction / Cryptographic hash functions / Hashing / Barbecue / Hash Bash / Barbecue in the United States / Hash function / Hash list / Hash / Food and drink / Cooking / American cuisine

The PIEDMONT BLUES and HASH BASH

Add to Reading List

Source URL: www.bluesandhash.com

Language: English - Date: 2012-08-28 12:20:23
865SHA-2 / RIPEMD / MD5 / Preimage attack / SHA-1 / MD4 / Collision attack / Collision resistance / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft PowerPoint - preneel_hash_albenav2_print.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-06-30 04:42:21
866Cryptographic hash functions / Advanced Encryption Standard / Secure communication / HMAC / SHA-2 / Block cipher / Key size / Symmetric-key algorithm / MD4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_mmm10v1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-09-10 07:39:29
867Hash function / Collision resistance / MD5 / SHA-1 / Differential cryptanalysis / MD4 / Block cipher / SHA-2 / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

´ n, a belt-and-mill hash function RadioGatu Guido Bertoni, Joan Daemen, Gilles Van Assche STMicroelectronics Micha¨el Peeters

Add to Reading List

Source URL: radiogatun.noekeon.org

Language: English - Date: 2013-02-27 15:27:44
868Hashing / Block ciphers / SHA-1 / SHA-2 / Key size / Key schedule / Symmetric-key algorithm / RC4 / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Stream ciphers

Microsoft PowerPoint - preneel_lightweight_shanghaiv1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-10-21 10:42:25
869SHA-1 / SHA-2 / MD4 / HMAC / Block cipher / Key size / Py / Data Encryption Standard / Crypt / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - preneel_abudhabiv2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-12-11 02:59:17
870Cryptographic hash functions / Artificial intelligence / Information retrieval / Searching / Cryptography / Error detection and correction / Hash function

RADIOGATÚN, a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michaël Peeters* and Gilles Van Assche STMicroelectronics

Add to Reading List

Source URL: radiogatun.noekeon.org

Language: English - Date: 2013-02-27 15:27:44
UPDATE