Hash functions

Results: 1148



#Item
1An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
2Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2016-09-29 20:50:51
    3How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, ,   Abstract. MD5 is one of the most widely used cryptographic hash funct

    How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

    Add to Reading List

    Source URL: merlot.usc.edu

    Language: English - Date: 2005-11-09 16:49:02
      4Hash Functions  Hash Functions Lecture 10  Hash Functions

      Hash Functions Hash Functions Lecture 10 Hash Functions

      Add to Reading List

      Source URL: courses.engr.illinois.edu

      Language: English - Date: 2016-02-25 12:47:48
      5Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

      Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2016-09-29 20:50:51
        6Implementation and Benchmarking of Perceptual Image Hash Functions Christoph Zauner  DIPLOMARBEIT

        Implementation and Benchmarking of Perceptual Image Hash Functions Christoph Zauner DIPLOMARBEIT

        Add to Reading List

        Source URL: www.phash.org

        Language: English - Date: 2010-07-20 12:14:14
          7Comments Received in Response to:  Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

          Comments Received in Response to: Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

          Add to Reading List

          Source URL: csrc.nist.gov

          - Date: 2017-02-24 15:05:30
            8(ARCHIVED as of AUGUST 5, 2015): DRAFT FIPS 202, SHA-3 Standard:  Permutation-Based Hash and Extendable-Output Functions

            (ARCHIVED as of AUGUST 5, 2015): DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

            Add to Reading List

            Source URL: csrc.nist.gov

            - Date: 2017-03-01 15:35:52
              9New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity Muhammad Barham1,? , Orr Dunkelman1,? , Stefan Lucks2 , and Marc Stevens3 1

              New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity Muhammad Barham1,? , Orr Dunkelman1,? , Stefan Lucks2 , and Marc Stevens3 1

              Add to Reading List

              Source URL: marc-stevens.nl

              - Date: 2017-08-13 07:48:58
                10Stellingen bij het proefschrift Attacks on Hash Functions and Applications door Marc Stevens

                Stellingen bij het proefschrift Attacks on Hash Functions and Applications door Marc Stevens

                Add to Reading List

                Source URL: marc-stevens.nl

                - Date: 2017-08-13 07:48:58