Hash functions

Results: 1148



#Item
891Science / Mathematics / Computational neuroscience / Cryptographic software / Network architecture / Backpropagation / Algorithm / SHA-1 / SHA-2 / Neural networks / Cryptography / Cryptographic hash functions

Neural Network Approach to Locating Cryptography in Object Code

Add to Reading List

Source URL: www.inl.gov

Language: English - Date: 2014-06-17 06:06:02
892Cryptographic software / Password / Security Accounts Manager / Cryptographic hash functions / Salt / Challenge-response authentication / Shadow password / Crypt / S/KEY / Cryptography / Computer security / Security

On NT Password Security By: Jos Visser This article is (c) Copyright 1997 Open Solution Providers. It may be referred to or reproduced in full only with full retention of this copyright message. For more information on t

Add to Reading List

Source URL: www.josvisser.nl

Language: English - Date: 2004-10-07 03:31:00
893Password / Cryptographic software / Cryptographic hash functions / Crypt / Salt / SQL injection / Brute-force attack / SHA-2 / Bcrypt / Cryptography / Computer security / Security

Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

Add to Reading List

Source URL: www.scienceandmathacademy.com

Language: English - Date: 2013-06-10 13:55:15
894Advanced Encryption Standard / Grøstl / NIST hash function competition / Whirlpool / Field-programmable gate array / AES implementations / Hash function / Crypt / Xilinx / Cryptography / Cryptographic hash functions / Error detection and correction

On Optimized FPGA Implementations of the SHA-3 Candidate Grøstl? Bernhard Jungk, Steffen Reith, and J¨ urgen Apfelbeck Fachhochschule Wiesbaden University of Applied Sciences {jungk|reith}@informatik.fh-wiesbaden.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-12 08:20:15
895Grøstl / Advanced Encryption Standard / Hash function / Birthday attack / NIST hash function competition / One-way compression function / SHA-1 / Cryptography / Cryptographic hash functions / Error detection and correction

Grøstl Addendum Praveen Gauravaram Lars R. Knudsen Krystian Matusiewicz Florian Mendel Christian Rechberger

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:54:57
896Hashing / MD4 / MD5 / SHA-1 / MD2 / RIPEMD / Collision attack / HMAC / Preimage attack / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
897Institute for Applied Information Processing and Communications / Vincent Rijmen / SHA-1 / Graz / Hash list / Stream cipher / Cryptography / Cryptographic hash functions / Hashing

Hash & Stream The State of the Art for Cryptographic Hash Functions and for Stream Ciphers Feb[removed], 2007 Dept. of Mathematics, University of Salzburg

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
898Collision attack / Collision resistance / Institute for Applied Information Processing and Communications / Hash function / Collision / Vincent Rijmen / Public key fingerprint / Provably secure cryptographic hash function / Preimage attack / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - HashIntro_talk1

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
899Hashing / Collision attack / Preimage attack / MD5 / SHA-2 / Shadow password / HMAC / SHA-1 / Crypt / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft PowerPoint - PracticalImpact_talk4

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
900MD4 / Tiger / RIPEMD / SHA-2 / Institute for Applied Information Processing and Communications / Vincent Rijmen / FORK-256 / Hash list / Cryptanalysis / Cryptographic hash functions / Cryptography / SHA-1

Microsoft PowerPoint - AlternativeHashFunctions_talk5

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
UPDATE