Hash functions

Results: 1148



#Item
951GOST standards / Grøstl / NIST hash function competition / GOST / Advanced Encryption Standard / Block cipher / MD5 / SHA-1 / Differential cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Integral Distinguishers for Reduced-round Stribog Riham AlTawy and Amr M. Youssef

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 15:56:16
952Grøstl / Differential cryptanalysis / Advanced Encryption Standard / Hash function / Block cipher / Cryptographic hash functions / Cryptography / NIST hash function competition / Error detection and correction

Updated Differential Analysis of Grøstl Martin Schl¨affer Institute for Applied Information Processing and Communications (IAIK)

Add to Reading List

Source URL: www.groestl.info

Language: English - Date: 2011-10-06 10:55:06
953NIST hash function competition / Eli Biham / SHA-2 / SHA-1 / Preimage attack / MD5 / Advanced Encryption Standard / Keccak / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

Updates on SHAvite-3 Eli Biham1 and Orr Dunkelman2 1

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2010-08-24 17:09:24
954Preimage attack / Haifa / Hash function / Collision resistance / Merkle–Damgård construction / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

Merkle-Damg˚ ard

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: English - Date: 2011-05-16 11:44:04
955Hashing / Hash function / Preimage attack / Padding / SHA-2 / Collision attack / Merkle–Damgård construction / Collision resistance / One-way compression function / Cryptographic hash functions / Cryptography / Error detection and correction

A Framework for Iterative Hash Functions — HAIFA Eli Biham1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-08 13:12:03
956NIST hash function competition / Search algorithms / MD5 / BLAKE / Keccak / Hash function / Block cipher / Differential cryptanalysis / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Analysis of BLAKE2 Jian Guo1 , Pierre Karpman1,2 , Ivica Nikoli´c1 , Lei Wang1 , and Shuang Wu1 1 Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-11-29 13:50:06
957One-way compression function / Merkle–Damgård construction / Random oracle / Universal one-way hash function / Collision resistance / Hash function / Collision / Birthday attack / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
958Cryptographic hash functions / Microsoft App-V / Hash tree / Hash function / Computing / Computer memory / Information / Data / Error detection and correction / Cache / Hashing

Missive: Fast Appliance Launch From an Untrusted Buffer Cache Jon Howell, Jeremy Elson, Bryan Parno, John R. Douceur Microsoft Research, Redmond, WA

Add to Reading List

Source URL: 131.107.65.14

Language: English - Date: 2013-01-31 17:33:54
959National Security Agency / NSA Suite B Cryptography / Elliptic curve cryptography / SHA-2 / SHA-1 / Advanced Encryption Standard / Key size / CRYPTREC / Cryptography / Cryptography standards / Cryptographic hash functions

Suite B Cryptography March 22, 2006 Elaine Barker

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-26 01:00:00
960Keccak / NIST hash function competition / RadioGatún / Joan Daemen / SHA-1 / SHA-2 / National Security Agency / Hash function / Cryptographic hash functions / Error detection and correction / Cryptography

Keccak and the SHA-3 Standardization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-11 13:30:30
UPDATE