<--- Back to Details
First PageDocument Content
Hashing / RSA / Hash function / Collision resistance / CBC-MAC / Hash chain / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Search algorithms
Date: 2008-03-10 18:06:00
Hashing
RSA
Hash function
Collision resistance
CBC-MAC
Hash chain
One-way compression function
Lamport signature
Cryptography
Cryptographic hash functions
Search algorithms

CS255: Cryptography and Computer Security Winter 2007

Add to Reading List

Source URL: crypto.stanford.edu

Download Document from Source Website

File Size: 61,78 KB

Share Document on Facebook

Similar Documents

Routing protocols / Hashing / Error detection and correction / Routing algorithms / Distributed data storage / Hash chain / Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Merkle tree / Cryptographic hash function / Distance-vector routing protocol

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

DocID: 1phYN - View Document

Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

DocID: 1oDfz - View Document

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The Netherlands

DocID: 1mkCs - View Document

Artificial intelligence / Cryptography / Hash table / Information science / Hash function / Hash chain / Cryptographic hash functions / Search algorithms / Hashing / Information retrieval

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science

DocID: 18LEA - View Document

Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

DocID: 180eG - View Document