Hash-based cryptography

Results: 78



#Item
51Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards⋆ Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers Radboud University Nijmegen, ICIS DS, Nijmegen, The Netherlands {a.delapiedra,

Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards⋆ Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers Radboud University Nijmegen, ICIS DS, Nijmegen, The Netherlands {a.delapiedra,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 05:32:30
52SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:52:44
53Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:52:32
54What hash functions were based on block ciphers

What hash functions were based on block ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:10:16
55LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange

LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
56Compact asymmetric authentication using hash-based signatures David McGrew, Cisco Fellow [removed]

Compact asymmetric authentication using hash-based signatures David McGrew, Cisco Fellow [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:20:56
57Five DRBG Algorithms Based on Hash Functions and Block Ciphers

Five DRBG Algorithms Based on Hash Functions and Block Ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:06:54
58Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 10:20:26
59Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Add to Reading List

Source URL: ccc.ustc.edu.cn

Language: English - Date: 2006-10-24 07:55:02
60References 1. ABA Bank Card Standard,

References 1. ABA Bank Card Standard, "Management and Use of Personal Information Numbers, " Aids from ABA, Catalog no[removed], American Bankers Association, [removed]ABA Document 4.3, "Key Management Standard," American

Add to Reading List

Source URL: www.ssl.stu.neva.ru

Language: English - Date: 2001-07-17 16:00:00