Hash functions

Results: 1148



#Item
991Mathematics / Computing / Logarithms / Hashing / Error detection and correction / Hash table / Hash function / MD5 / Trie / Cryptography / Cryptographic hash functions / Search algorithms

Parallel Collision Search with Application to Hash Functions and Discrete Logarithms Paul C. van Oorschot and Michael J. Wiener

Add to Reading List

Source URL: www.certainkey.com

Language: English - Date: 2001-09-18 05:27:04
992Random oracle / Advantage / Padding / Stream cipher / Collision resistance / Hash function / Keccak / One-way compression function / Cryptography / Cryptographic hash functions / Block cipher

Cryptographic sponge functions Guido B

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
993Espionage / Search algorithms / Hashing / Rainbow table / Password / John the Ripper / LM hash / Salt / Crypt / Cryptography / Cryptographic hash functions / Computer security

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2009-08-16 16:22:06
994SHA-1 / MD4 / Collision attack / Padding / Hash function / Crypt / HAVAL / Cryptographic hash functions / Cryptography / MD5

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan[removed], China

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:28
995Hashing / One-way compression function / Hash function / Collision resistance / MDC-2 / Birthday attack / Preimage attack / Block cipher / Collision attack / Cryptographic hash functions / Cryptography / Search algorithms

Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-06-01 18:17:49
996Cryptographic hash functions / B-tree / Computing / Computer programming / Hash tree / Hash function / B+ tree / Trie / Binary tree / Hashing / Error detection and correction / Cryptography

Dynamic Authenticated Index Structures for Outsourced Databases Feifei Li†

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2009-12-07 16:22:51
997Hashing / MD5 / Cryptography / Differential calculus / MD4 / SHA-1 / Differential of a function / Exact differential / Cryptographic hash functions / Mathematics / Mathematical analysis

A Study of the MD5 Attacks: Insights and Improvements J. Black ∗

Add to Reading List

Source URL: www.cs.colorado.edu

Language: English - Date: 2006-03-03 16:29:39
998Mathematical analysis / SWIFFT / Fast Fourier transform / Universal hashing / Fourier transform / SHA-2 / Vector space / Random oracle / Hash function / Cryptographic hash functions / Mathematics / Algebra

SWIFFT: A Modest Proposal for FFT Hashing Vadim Lyubashevsky1 , Daniele Micciancio1 , Chris Peikert2, , and Alon Rosen3 1

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2009-08-17 12:04:34
999Cryptographic hash functions / HMAC / Key / Symmetric-key algorithm / SHA-2 / Ciphertext / Public-key cryptography / Index of cryptography articles / Book:Cryptography / Cryptography / Message authentication codes / Hashing

Everything you need to know about cryptography in 1 hour

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2011-07-30 14:49:49
1000GOST / Differential cryptanalysis / Key schedule / ICE / Block cipher / Film speed / Differential of a function / Advanced Encryption Standard / Cryptography / GOST standards / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 16:56:46
UPDATE