Hash functions

Results: 1148



#Item
81Mathematics / Elementary mathematics / Music / Functions and mappings / Search algorithms / Calques / Earworm / Music psychology / Advanced Encryption Standard / Derivative / Variable / Hash function

The earworm Password Hashing Algorithm Password Hashing Competition Submission Document (Round 1) Daniel Franke <> March 31, 2014

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:32:13
82

Faster Multicollisions∗ Jean-Philippe Aumasson FHNW, Windisch, Switzerland Abstract. Joux’s multicollision attack is one of the most striking results on hash functions and also one of the simplest: it computes a k-co

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:45
    83

    Programmable Hash Functions in the Multilinear Setting ? Eduarda S.V. Freire1,?? , Dennis Hofheinz2,? ? ? , Kenneth G. Paterson1,† and Christoph Striecks2 1

    Add to Reading List

    Source URL: www.kjdf.de

    Language: English - Date: 2014-06-10 05:37:37
      84Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

      Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

      Add to Reading List

      Source URL: www.estv.admin.ch

      Language: English
      85Cryptocurrencies / Cryptography / Cryptographic hash functions / Error detection and correction / Hashing / Information retrieval / Information science / Digital currencies / Draft:Viccoin:APeer-to-PeerDigital Currency System / Vic coin / Bitcoin network / Merkle tree

      Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

      Add to Reading List

      Source URL: www.weusecoins.com

      Language: English - Date: 2016-06-04 00:10:37
      86Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

      PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-12-09 05:42:43
      87Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

      This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

      Add to Reading List

      Source URL: www.normalesup.org

      Language: English - Date: 2015-02-21 09:51:42
      88

      Multivariate hash functions: constructions and security Jean-Philippe Aumasson

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:46:57
        89

        Herding Hash Functions and the Nostradamus Attack John Kelsey1 and Tadayoshi Kohno2 1 National Institute of Standards and Technology,

        Add to Reading List

        Source URL: homes.cs.washington.edu

        Language: English - Date: 2010-01-06 01:14:49
          90Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

          Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

          Add to Reading List

          Source URL: www.mitls.org

          Language: English - Date: 2016-01-06 07:34:05
          UPDATE