One-way compression function

Results: 80



#Item
51CS255: Cryptography and Computer Security  Winter 2011

CS255: Cryptography and Computer Security Winter 2011

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2011-02-13 13:17:18
52Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:12:02
53SHA-3 submission – Tweaked version: [removed]SIMD Is a Message Digest

SHA-3 submission – Tweaked version: [removed]SIMD Is a Message Digest

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2010-02-23 10:07:00
54The SHAvite-3 Hash Function Tweaked Version[removed]

The SHAvite-3 Hash Function Tweaked Version[removed]

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2009-11-23 10:40:19
55This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
56The Hash Function JH  1

The Hash Function JH 1

Add to Reading List

Source URL: perso.uclouvain.be

Language: English - Date: 2012-07-05 12:19:19
57Merkle-Damg˚ ard

Merkle-Damg˚ ard

Add to Reading List

Source URL: www.cs.haifa.ac.il

Language: English - Date: 2011-05-16 11:44:04
58A Framework for Iterative Hash Functions — HAIFA Eli Biham1

A Framework for Iterative Hash Functions — HAIFA Eli Biham1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-08 13:12:03
59Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
60Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-04-11 11:06:58