One-way function

Results: 187



#Item
21Message authentication codes / CBC-MAC / Block cipher / SHA-1 / Cryptographic hash function / Padding / UMAC / Hash-based message authentication code / Hash function / One-way compression function / Galois/Counter Mode

A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:26
22Philosophy / Cognitive science / Academia / Neuropsychology / Derek Parfit / Personal identity / Self / Consciousness / Mind / Person / Lateralization of brain function / Cerebrum

IDENTITY MATTERS I. Introduction Personal Identity is the branch of metaphysics that inquires into what kind of being we are and what it takes for us to persist from one time to another. One way to approach the topic is

Add to Reading List

Source URL: www.acsu.buffalo.edu

Language: English - Date: 2010-03-08 16:56:55
23Applied mathematics / Quantum complexity theory / Computational complexity theory / Secure multi-party computation / Communication complexity / Secure two-party computation / PP / One-way function / IP / Cryptography / Theoretical computer science / Cryptographic protocols

Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-04 05:09:56
24RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
25

Area Ministries of the Central States Synod, ELCA The function of each Area Ministry is to develop its own way of work to fulfill its purpose. Area Ministry One —

Add to Reading List

Source URL: www.css-elca.org

Language: English - Date: 2015-03-26 13:23:27
    26Binary operations / Finite fields / Computational hardness assumptions / Group theory / Trapdoor function / Public-key cryptography / One-way function / Exponentiation / Discrete logarithm / Cryptography / Abstract algebra / Mathematics

    An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alp´ ar1,2⋆ , Jaap-Henk Hoepman1,2 , and Wouter Lueks1,2⋆⋆ 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-02-28 05:16:42
    27Applied mathematics / Search algorithms / Hashing / Computational complexity theory / Pseudorandom function family / Pseudorandom generator / Hash function / Cuckoo hashing / One-way function / Theoretical computer science / Mathematics / Pseudorandomness

    Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2013-06-11 04:11:57
    28Search algorithms / Ciphertext indistinguishability / Random oracle / Advantage / Hash function / ElGamal encryption / One-way function / Optimal asymmetric encryption padding / Probabilistic encryption / Cryptography / Cryptographic hash functions / Hashing

    CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:43
    29Finite fields / Information theory / Information / Computing / Mathematics / Network coding / Cryptographic hash function / Hash function / One-way function / Hashing / Cryptography / Coding theory

    On the Practical and Security Issues of Batch Content Distribution Via Network Coding Qiming Li Dah-Ming Chiu John C.S. Lui Computer & Information Science Dept

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2006-08-26 01:38:18
    30Hashing / Search algorithms / Schnorr signature / Digital signature / Random oracle / One-way function / Universal hashing / RSA / Hash function / Cryptography / Public-key cryptography / Cryptographic hash functions

    Proceedings of Selected Areas in Cryptography ’98 (August 17–18, 1998, Kingston, Ontario, Canada) S. Tavares and H. Meijer Eds. Springer-Verlag, LNCS 1556, pages 72–80. Computational Alternatives to Random Number G

    Add to Reading List

    Source URL: www.di.ens.fr

    Language: English - Date: 2002-06-27 15:00:00
    UPDATE