Hash functions

Results: 1148



#Item
981Hashing / Message authentication codes / Coding theory / HMAC / SHA-2 / MD5 / Key derivation function / Collision attack / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
982Preimage attack / MD5 / Hash function / SHA-1 / Collision attack / Padding / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Second Preimage Attacks on Dithered Hash Functions Elena Andreeva1 , Charles Bouillaguet2 , Pierre-Alain Fouque2 ,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-02-11 08:25:42
983Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
984NIST hash function competition / Hashing / MD6 / MD5 / MD4 / SHA-2 / SHA-1 / Collision resistance / Preimage attack / Error detection and correction / Cryptography / Cryptographic hash functions

Security Proofs for the MD6 Hash Function Mode of Operation by

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-11-05 16:27:34
985MD5 / Hashing / Collision attack / SHA-1 / MD4 / Hash function / Collision resistance / Padding / Birthday attack / Cryptography / Error detection and correction / Cryptographic hash functions

Eindhoven University of Technology Department of Mathematics and Computing Science

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-07-05 06:20:54
986Whirlpool / Crypt / Hash function / Cryptographic hash functions / Cryptography / Error detection and correction

Microsoft Word - 3. High-Speed Parallel Architecture of the Whirlpool Hash Function

Add to Reading List

Source URL: www.sersc.org

Language: English - Date: 2009-07-31 02:54:04
987One-way compression function / Feistel cipher / CAST-128 / Cryptographic hash functions

The CAST-256 Encryption Algorithm Carlisle Adams CAST-256 is a symmetric cipher designed in accordance with the CAST design

Add to Reading List

Source URL: www.mavi1.org

Language: English - Date: 2012-11-07 04:01:25
988Hashing / Hash function / Artificial intelligence / Information retrieval / Searching / Cryptographic hash functions / Error detection and correction / Cryptography

Observations on H-PRESENT-128 Niels Ferguson Microsoft

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2011-08-17 15:01:29
989Search algorithms / Cryptographic hash functions / EMC Corporation / SecurID / Hash function / Hash list / Hashing / Error detection and correction / Cryptography

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yinini

Add to Reading List

Source URL: www.crypto-world.com

- Date: 2011-04-01 07:21:47
990Hashing / Information retrieval / Artificial intelligence / Error detection and correction / Hash function / Bloom filter / Hash table / One-way compression function / Cryptography / Search algorithms / Cryptographic hash functions

Space/Time Trade-offs in Hash Coding with Allowable Errors

Add to Reading List

Source URL: crystal.uta.edu

Language: English - Date: 2005-04-12 16:14:35
UPDATE