Hash-based cryptography

Results: 78



#Item
71Digital signature / Key / Cryptographic hash function / Probabilistic encryption / Message authentication code / Symmetric-key algorithm / RSA / ID-based encryption / Signcryption / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
72MD5 / Merkle–Damgård construction / SHA-1 / Collision resistance / Collision / One-way compression function / Fast Syndrome Based Hash / Cryptographic hash functions / Cryptography / Hash function

CS255: Cryptography and Computer Security Winter 2010

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-02-10 16:51:29
73Advanced Encryption Standard / Message authentication codes / Hashing / SecurID / ICE / VEST / Hash function / Lookup table / Hamming weight / Cryptography / Cryptographic hash functions / Stream ciphers

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yin2 1 Macquarie University, Computing Department, NSW 2109 Australia, [removed],

Add to Reading List

Source URL: www.crypto-world.com

Language: English - Date: 2011-04-01 07:21:08
74Hashing / SHA-2 / SHA-1 / Keccak / NIST hash function competition / Secure Hash Standard / Crypt / Hash function / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-09 12:06:39
75Hash function / SHA-1 / Lamport signature / ElGamal signature scheme / Cryptography / Digital signature / Cryptographic hash function

Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-03-15 18:18:40
76Search algorithms / Cryptographic hash functions / EMC Corporation / SecurID / Hash function / Hash list / Hashing / Error detection and correction / Cryptography

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yinini

Add to Reading List

Source URL: www.crypto-world.com

- Date: 2011-04-01 07:21:47
77Fast Syndrome Based Hash / Hash function / Linear code / MD5 / Collision resistance / SHA-2 / Low-density parity-check code / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2007-05-11 03:26:00
78Search algorithms / Provably secure cryptographic hash function / Applied mathematics / Fast Syndrome Based Hash / Hash function / One-way function / Cyberwarfare / Collision resistance / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-05 07:41:01
UPDATE