Hash functions

Results: 1148



#Item
941NIST hash function competition / SHA-2 / Preimage attack / SHA-1 / MD5 / Skein / Threefish / MD4 / Rotational cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-07 10:17:20
942Feistel cipher / Block cipher / Pseudorandom permutation / Oracle machine / Random oracle / Permutation / Oracle Corporation / Slide attack / ICE / Cryptography / Cryptographic hash functions / Advantage

Eliminating Random Permutation Oracles in the Even-Mansour Cipher Craig Gentry and Zulfikar Ramzan

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
943Block cipher / Cryptanalysis / Hellman / Differential cryptanalysis / Tiger / Diffie–Hellman key exchange / Index of cryptography articles / Outline of cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

Microsoft PowerPoint - Rechberger_IDEA_v2

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2012-04-20 07:04:20
944JH / Advanced Encryption Standard / Q / ICE / Cryptographic hash functions / Serpent / Grøstl / One-way compression function / Cryptography / NIST hash function competition / Block cipher

The Hash Function JH 1

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2012-07-05 12:19:19
945Grøstl / SHA-1 / Advanced Encryption Standard / SHA-2 / Tiger / MD5 / Hash function / Permutation / Block cipher / Error detection and correction / Cryptographic hash functions / Cryptography

Grøstl – a SHA-3 candidate ∗

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:38
946Error detection and correction / Preimage attack / Search algorithms / Hash function / Collision attack / Birthday attack / Hash tree / Padding / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damg˚ ard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-02-02 00:00:00
947Stream ciphers / Threefish / Skein / ICE / VEST / SHA-2 / SHA-1 / Block cipher / Salsa20 / Cryptography / Error detection and correction / Cryptographic hash functions

Improved Cryptanalysis of Skein 3 ¨

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-08 02:25:05
948SHA-1 / MD5 / Collision attack / MD4 / SHA-2 / Cryptanalysis / Padding / Crypt / Tiger / Cryptography / Cryptographic hash functions / Hashing

Counter-cryptanalysis Marc Stevens CWI, Amsterdam, The Netherlands

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2013-06-08 07:57:19
949Computer architecture / Cryptographic hash functions / Instruction set architectures / Keccak / Skein / SHA-1 / Fugue / SHA-2 / CPU cache / Error detection and correction / NIST hash function competition / Computing

SHA-3 Conference, August 2010, Comparative Performance Review of the SHA-3 Second-Round Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 13:39:10
950GOST / Hashing / Advanced Encryption Standard / Block cipher / Grøstl / Cryptography / GOST standards / Cryptographic hash functions

Algebraic Aspects of the Russian Hash Standard GOST R[removed]Oleksandr Kazymyrov, Valentyna Kazymyrova

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-03 14:56:20
UPDATE