Hash functions

Results: 1148



#Item
881Cryptographic protocols / Key management / HMAC / Key derivation function / Cryptographic hash function / Transport Layer Security / Key / CMAC / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:44:46
882Theoretical computer science / Recursion / Function / Hash function / Eval / Fixed-point combinator / Comparison of programming languages / Μ operator / Mathematics / Functions and mappings / Computing

Data Types, Functions, and Programming Daniel R. Grayson? and Michael E. Stillman?? In this chapter we present an introduction to the structure of Macaulay 2 commands and the writing of functions in the Macaulay 2 langua

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2001-04-28 11:05:54
883Cryptographic hash functions / Search algorithms / Information retrieval / Information science / Computing / Trie / Hash tree / Hash function / Padding / Hashing / Error detection and correction / Cryptography

S : a flexible coding for tree hashing Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2014-04-18 11:02:15
884Cryptographic hash functions / Digital electronics / Field-programmable gate array / Xilinx / Keccak / SHA-2 / Altera / Joint Test Action Group / NIST hash function competition / Electronic engineering / Electronics / Fabless semiconductor companies

SHA-3 Conference, March 2012, Lightweight Implementations of SHA-3 Fialists on FPGAs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:06:14
885Cryptography standards / NESSIE / MISTY1 / KHAZAD / SHA-2 / Katholieke Universiteit Leuven / SHACAL / Leuven / Whirlpool / Cryptography / Block ciphers / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2005-06-13 10:26:02
886Cryptographic hash functions / Keccak / Skein / JH / Grøstl / SHA-1 / SHA-2 / Advanced Encryption Standard / Crypt / Error detection and correction / NIST hash function competition / Cryptography

SHA-3 Conference, March 2012, Evaluation of Compact FPGA Implementations for All SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:04:20
887Cryptographic hash functions / Hash function / Hash House Harriers / Hash list / Hash / Recreation / Information retrieval / Artificial intelligence / Error detection and correction / Hashing / Search algorithms

LION CITY HASH HOUSE HARRIERS PO Box 473, Orchard Road Post Office, Singapore[removed]ROS REF:  [removed]SPO Registered 28 July, 1983

Add to Reading List

Source URL: lioncityhash.com

Language: English - Date: 2010-09-26 03:41:19
888GOST standards / GOST / Hashing / SHA-1 / MD5 / Keccak / Hash function / Advanced Encryption Standard / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

rebound_gost_r.tex Click here to view linked References Cryptanalysis of GOST R Hash Function Zongyue Wanga , Hongbo Yub,∗, Xiaoyun Wangb a Key

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-10 21:29:48
889Mathematical logic / Commitment scheme / Lottery / Function / Image / Inverse function / Cryptographic hash function / Preimage attack / Surjective function / Mathematics / Cryptography / Functions and mappings

Noname manuscript No. (will be inserted by the editor) Temporarily Hidden Bit Commitment and Lottery Applications David M. Goldschlag · Stuart G. Stubblebine · Paul F. Syverson

Add to Reading List

Source URL: www.syverson.org

Language: English - Date: 2012-03-07 08:53:12
890NIST hash function competition / SHA-2 / Keccak / Crypt / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

SHA[removed]Workshop Call for Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-13 08:24:21
UPDATE