Hash functions

Results: 1148



#Item
871One-way compression function / MD5 / Preimage attack / SHA-2 / SHA-1 / Merkle–Damgård construction / Collision attack / N-Hash / Birthday attack / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft PowerPoint - preneel_hash_tools_2012v2.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2012-05-31 19:52:41
872Electronic commerce / Key management / Hashing / Key size / SHA-1 / SHA-2 / RSA / Collision attack / NIST hash function competition / Cryptography / Cryptographic hash functions / Public-key cryptography

Microsoft PowerPoint - preneel_closing_isse12v4.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2013-10-24 09:07:43
873COSIC / Bart Preneel / Py / RC4 / MESH / RIPEMD / NESSIE / One-way compression function / Len Sassaman / Cryptography / Stream ciphers / Cryptographic hash functions

Publication List Bart PRENEEL Full professor KU Leuven

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2012-07-17 18:23:56
874One-way function / Permutation / Preimage attack / Applied mathematics / Mathematics / Combinatorics / Cryptography

Hash Functions Based on Three Permutations: A Generic Security Analysis Bart Mennink and Bart Preneel Dept. Electrical Engineering, ESAT/COSIC, KU Leuven, and IBBT, Belgium [removed], bart.preneel@esa

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
875Error detection and correction / Information retrieval / Artificial intelligence / Information science / Cryptography / Hash function / Merkle–Damgård construction / Hash tree / Tabulation hashing / Hashing / Cryptographic hash functions / Search algorithms

Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
876Post-quantum cryptography / Hashing / Merkle signature scheme / Hash tree / Digital signature / SHA-2 / RSA / SHA-1 / Hash function / Cryptography / Cryptographic hash functions / Public-key cryptography

2006 IEEE 24th Convention of Electrical and Electronics Engineers in Israel One-Time Signatures Revisited: Practical Fast Signatures Using Fractal Merkle Tree Traversal Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: www.eng.tau.ac.il

Language: English - Date: 2006-11-22 02:16:55
877Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction

Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
878NIST hash function competition / Integrated circuits / Electronic design automation / Cryptographic hash functions / Electronic design / Application-specific integrated circuit / Keccak / Field-programmable gate array / Standard cell / Electronic engineering / Electronics / Cryptography

SHA-3 Conference, March 2012, Lessons Learned from Designing a 65 nm ASIC for Evaluating Third Round SHA-3 Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:01:30
879Keccak / RadioGatún / Joan Daemen / Block cipher / Hash function / Cryptography / Cryptographic hash functions / NIST hash function competition

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-05-28 00:25:06
880ICE / Block cipher / S-box / VEST / Substitution-permutation network / Differential cryptanalysis / Cryptography / Data Encryption Standard / Cryptographic hash functions

PAIRS AND TRIPLETS OF DES S-BOXES Donald Davies Sean Murphy Information Security Group, Royal Holloway and Bedford New College,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:40
UPDATE