Hash

Results: 3740



#Item
461Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: www.mitls.org

Language: English - Date: 2016-01-06 07:34:05
462Computer arithmetic / Modular arithmetic / Central processing unit / Search algorithms / Exponentials / Exponentiation by squaring / Montgomery modular multiplication / Hash function / Processor register / 64-bit computing / Euclidean vector

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-09-06 14:08:28
463

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The Netherlands

Add to Reading List

Source URL: fc16.ifca.ai

Language: English - Date: 2016-02-08 20:23:35
    464

    How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

    Add to Reading List

    Source URL: s3-eu-west-1.amazonaws.com

    Language: English - Date: 2014-12-18 11:32:43
      465

      password hash dump investigation.docx

      Add to Reading List

      Source URL: isis.poly.edu

      Language: English - Date: 2013-09-18 15:00:25
        466Search algorithms / Information retrieval / Information science / Hashing / Mathematics / Mathematical optimization / Operations research / Arrays / Hash table / Hash function / Universal hashing / Dynamic programming

        October 17, Fall 2007 Quiz 1 Solutions Introduction to Algorithms Massachusetts Institute of Technology

        Add to Reading List

        Source URL: courses.csail.mit.edu

        Language: English - Date: 2009-05-07 21:09:16
        467NIST hash function competition / Cryptography / Skein / SHA-3 / SHA-2 / Grstl / JH / Cryptographic hash function / BLAKE / 64-bit computing / X86-64 / MD6

        sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

        Add to Reading List

        Source URL: www.bolet.org

        Language: English - Date: 2015-09-06 14:06:03
        468Hashing / Information retrieval / Information science / Search algorithms / Hash table / Open addressing / Linear probing / Quadratic probing / Hash function / Double hashing / Cryptographic hash function / Hash

        6.006 Intro to Algorithms Recitation 05 February 16, 2011

        Add to Reading List

        Source URL: courses.csail.mit.edu

        Language: English - Date: 2011-02-16 17:35:41
        469Mathematics / Search algorithms / Binary trees / Mathematical analysis / Combinatorics / Analysis of algorithms / Asymptotic analysis / Big O notation / Mathematical notation / Self-balancing binary search tree / Hash function / Hash table

        October 17, Fall 2007 Quiz 1 Introduction to Algorithms Massachusetts Institute of Technology

        Add to Reading List

        Source URL: courses.csail.mit.edu

        Language: English - Date: 2009-05-12 11:12:56
        470Cryptography / Cryptanalysis / Chosen-ciphertext attack / Block cipher / Data Encryption Standard / Chosen-plaintext attack / Strong cryptography / Cryptographic hash function / Known-plaintext attack / Key / Ciphertext-only attack / Ciphertext

        Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

        Add to Reading List

        Source URL: www.nds.rub.de

        Language: English - Date: 2015-12-11 07:25:27
        UPDATE