Hash

Results: 3740



#Item
411

Programmable Hash Functions and Their Applications Dennis Hofheinz1 Eike Kiltz2 March 16, 2011

Add to Reading List

Source URL: www.kjdf.de

Language: English - Date: 2014-06-10 05:37:42
    412

    Analysis of Multivariate Hash Functions Jean-Philippe Aumasson? and Willi Meier?? FHNW, 5210 Windisch, Switzerland Abstract. We analyse the security of new hash functions whose compression function is explicitly defined

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:46
      413Cryptography / Salt / Password / Cryptographic hash function / Crypt / Hash function / Random password generator / PBKDF2 / Key derivation function / Key / Bcrypt / Scrypt

      The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2015-04-27 09:52:37
      414Concurrency control / Information science / Computing / Information retrieval / Transaction processing / Hashing / Search algorithms / Error detection and correction / Software transactional memory / Lock / Hash table / Linearizability

      adaptSTM - An Online Fine-grained Adaptive STM System Mathias Payer Thomas R. Gross ETH Zurich, Switzerland

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      415Cryptography / Public-key cryptography / Commitment scheme / Cryptographic hash function / CramerShoup cryptosystem / RSA / Crypt / Digital signature

      This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

      Add to Reading List

      Source URL: www.normalesup.org

      Language: English - Date: 2015-02-21 09:51:42
      416Food and drink / World cuisine / Fast food / British cuisine / Fried egg / Breakfast / Omelette / Eggs Benedict / Pancake / Scrambled eggs / Food Paradise

      Brunch Menu EGGS YOUR WAY* Two eggs, served your way, with hash browns, toast, and choice of bacon or ham. 9 OMELETTES*

      Add to Reading List

      Source URL: www.ironbridgeclub.com

      Language: English
      417

      Q UARK a lightweight hash Jean-Philippe Aumasson with Luca Henzen, Willi Meier, Mar´ıa Naya-Plasencia

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:47:01
        418Cryptography / Key management / Cryptographic hash functions / Feistel cipher / Key stretching / Block cipher / Crypt / Scrypt / Password / Key derivation function / Data Encryption Standard / Key

        Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2014-04-03 12:37:38
        419Cryptography / Cryptographic hash functions / Search algorithms / Key management / Hashing / Scrypt / Salt / Password / Hash function / Crypt / Key derivation function / SHA-2

        TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2014-04-03 12:39:48
        420Cryptography / Hash function / Crypt / Key derivation function / Salt / Password / Pomelo / Key

        POMELO A Password Hashing Algorithm (Version 2) Designer and Submitter: Hongjun Wu Division of Mathematical Sciences Nanyang Technological University

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2015-04-14 02:03:17
        UPDATE