Hash

Results: 3740



#Item
511

RC4-Hash : A New Hash Function based on RC4 (Extended Abstract) Donghoon Chang1 , Kishan Chand Gupta2 , and Mridul Nandi3 1 2

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2011-12-28 03:46:39
    512Cryptographic hash functions / NIST hash function competition / SHA-3

    SHA-3 Conference, February 2009, Shabal

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-05 11:30:32
    513

    File Name: jonymi.exe MD5 Hash Identifier: B213B65D77DA7F873140144FC6288ECF SHA-1 Hash Identifier: 018976EB129510C4B69152668E305B5FAAE436B0 File Size: File Type: PE32 executable (GUI) Intel 80386, for MS Windows P

    Add to Reading List

    Source URL: radetskiy.files.wordpress.com

    Language: English - Date: 2015-02-08 10:08:23
      514

      Microsoft PowerPoint - preneel_hash_2013v1

      Add to Reading List

      Source URL: ice.mat.dtu.dk

      Language: English - Date: 2013-06-08 06:24:31
        515

        1 of 2 http://www1.distributed.net/pressroom/newstxt -----BEGIN PGP SIGNED MESSAGE----Hash: SHA1 FORMAL PRESS RELEASE

        Add to Reading List

        Source URL: www.distributed.net

        Language: English - Date: 2009-08-08 23:28:40
          516

          On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis∗ Iftach Haitner† Aris Tentes‡

          Add to Reading List

          Source URL: www.cs.tau.ac.il

          Language: English - Date: 2013-06-11 04:12:56
            517Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

            SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

            Add to Reading List

            Source URL: nvlpubs.nist.gov

            Language: English - Date: 2015-08-04 11:34:10
            518Distributed data storage / Computing / Network architecture / Chord / Distributed computing / Link-state routing protocol / Pastry / Routing / Distributed hash table / Tapestry

            Group Therapy for Systems: Using link attestations to manage failures Michael J. Freedman, Ion Stoica, David Mazi`eres, and Scott Shenker New York University, U.C. Berkeley, and Stanford University Abstract

            Add to Reading List

            Source URL: iptps06.cs.ucsb.edu

            Language: English - Date: 2006-02-15 01:41:06
            519

            A Survey of Recent Cryptanalysis on Hash Functions Yu Sasaki NTT Corporation 30/AugASK 2011@NTU 1

            Add to Reading List

            Source URL: web.spms.ntu.edu.sg

            Language: English - Date: 2012-03-13 12:15:13
              520Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

              FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

              Add to Reading List

              Source URL: nvlpubs.nist.gov

              Language: English - Date: 2015-08-04 11:33:21
              UPDATE