Hash functions

Results: 1148



#Item
921Hashing / SHA-2 / SHA-1 / Keccak / NIST hash function competition / Secure Hash Standard / Crypt / Hash function / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-09 12:06:39
922

Draft FIPS 202 SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2014-04-08 12:05:55
    923Peer-to-peer computing / Concurrent computing / Transaction processing / Cryptographic hash functions / Error detection and correction / Hashing / Computing / Software / Bitcoin

    Accelerating Bitcoin’s Transaction Processing Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky∗

    Add to Reading List

    Source URL: www.cs.huji.ac.il

    Language: English - Date: 2013-12-05 04:14:54
    924Preimage attack / Keccak / SHA-2 / Crypt / NIST hash function competition / Hash function / Lamport signature / Cryptographic hash functions / Error detection and correction / Cryptography

    Microsoft Outlook - Memo Style

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2013-11-05 14:22:31
    925Cryptographic hash functions / SHA-1 / Keccak / Skein / BLAKE / Secure Hash Standard / CubeHash / Vlastimil Klíma / SIMD / NIST hash function competition / Error detection and correction / Cryptography

    NISTIR 7764, Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-03-01 16:20:57
    926SHA-1 / Preimage attack / SHA-2 / MD5 / ICE / S-box / Hash function / Differential cryptanalysis / VEST / Cryptography / Error detection and correction / Cryptographic hash functions

    Finding Collisions for Reduced Luffa-256 v2 Bart Preneel2 , Hirotaka Yoshida12 , and Dai Watanabe1 1

    Add to Reading List

    Source URL: www.hitachi.com

    Language: English - Date: 2014-03-19 02:03:06
    927NIST hash function competition / Hashing / Message authentication codes / Keccak / HMAC / Hash function / Crypt / ICE / VEST / Error detection and correction / Cryptography / Cryptographic hash functions

    The K SHA-3 submission

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    928Computing / Error detection and correction / Search algorithms / Hash function / SHA-2 / Hash list / Hash table / Crypt / Rsync / Cryptographic hash functions / Cryptography / Hashing

    digital investigation 3S[removed]S91–S97 available at www.sciencedirect.com

    Add to Reading List

    Source URL: dfrws.org

    Language: English - Date: 2007-03-18 21:36:24
    929MD4 / SHA-2 / SHA-1 / MD5 / Collision attack / MD2 / Collision resistance / One-way function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Preimage attack

    MD4 is Not One-Way Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2008-11-30 19:44:46
    930Computing / Merkle–Damgård construction / SIMD / Symmetry in mathematics / Symmetry / Hash function / Symmetric matrix / Block cipher / Cryptographic hash functions / Error detection and correction / Cryptography

    Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-06-01 05:47:23
    UPDATE