Hashing

Results: 1317



#Item
871Pseudorandom number generators / Cryptographic hash function / Hashing / RdRand / Entropy / Random number generation / NIST hash function competition / AES instruction set / Key management / Cryptography / Randomness / Information theory

Intel and Random Numbers David Johnston [removed] NIST Random Number Workshop Inconvenient Truths

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:42:38
872Cryptographic hash functions / Error detection and correction / Hash tree / Digital signature / Cryptographic primitive / Merkle signature scheme / Lamport signature / Cryptography / Hashing / Public-key cryptography

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23
873Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
874Block cipher / Theoretical computer science / Mathematics / Universal hashing / Find first set / One-key MAC / CBC-MAC / Message authentication codes / Cryptography / PMAC

First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operation: PMAC: A Parallelizable Message Authentication Code

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:41:02
875Search algorithms / Hash functions / MD5 / SHA-1 / Rolling hash / Error detection and correction / Hashing / Cryptographic hash functions

ManTech SMA Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-03-18 21:36:18
876Distributed computing / Distributed data storage / File sharing / Gnutella / Peer-to-peer / Distributed hash table / Hashing / Overlay network / Bloom filter / File sharing networks / Computing / Concurrent computing

Parallel Processing Letters, Vol. 19, No[removed] %%ft^ i«, ^w

Add to Reading List

Source URL: linc.ucy.ac.cy

Language: English - Date: 2013-07-17 04:53:10
877Error detection and correction / Cryptography / Information retrieval / Computing / Hash function / Hash table / Associative array / Hash list / Comparison of programming languages / Hashing / Search algorithms / Cryptographic hash functions

Package ‘hash’ July 2, 2014 Type Package Title Full feature implementation of hash/associated arrays/dictionaries Version[removed]Date[removed]

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 12:06:36
878Hashing / SHA-2 / HMAC / Pseudorandom number generator / Computing / Message authentication codes / Key derivation function / Key management

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
879Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
880HMAC / Hashing / Advantage / Pseudorandom function family / Function / Information theory / Random oracle / Cryptography / Message authentication codes / Cryptographic hash functions

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37
UPDATE