N-Hash

Results: 65



#Item
61Data / Information / Oblivious transfer / Database / Cache / Advantage / Replication / Server / Hash table / Cryptographic protocols / Private information retrieval / Computing

International Journal of Information Security manuscript No. (will be inserted by the editor) Xuhua Ding · Yanjiang Yang · Robert H. Deng · Shuhong Wang A New Hardware-assisted PIR with O(n) Shuffle Cost

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2010-04-15 23:16:19
62Search algorithms / Computing / Information retrieval / Artificial intelligence / Cryptography / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.coralcdn.org

Language: English - Date: 2004-03-19 09:39:34
63Search algorithms / Hashing / Preimage attack / MD5 / SHA-1 / Collision attack / Hash function / Hash table / MD4 / Cryptography / Cryptographic hash functions / Error detection and correction

Second Preimages on n-bit Hash Functions for Much Less than 2n Work John Kelsey1 and Bruce Schneier2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-11-29 10:08:07
64Threefish / Skein / Salsa20 / Differential cryptanalysis / MD5 / Mod n cryptanalysis / Key schedule / SHA-1 / Cryptanalysis / Cryptography / Block ciphers / Rotational cryptanalysis

PDF Document

Add to Reading List

Source URL: www.skein-hash.info

Language: English - Date: 2012-03-27 04:09:19
65SHA-1 / Differential cryptanalysis / Hash function / Rectangular function / MD4 / Collision resistance / Tiger / Whirlpool / N-Hash / Cryptographic hash functions / Cryptography / Preimage attack

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-04-09 11:04:26
UPDATE