<--- Back to Details
First PageDocument Content
Search algorithms / SWIFFT / Merkle–Damgård construction / Applied mathematics / Hash function / One-way function / Computing / Cyberwarfare / GOST / Cryptographic hash functions / Cryptography / Hashing
Date: 2008-10-30 09:32:13
Search algorithms
SWIFFT
Merkle–Damgård construction
Applied mathematics
Hash function
One-way function
Computing
Cyberwarfare
GOST
Cryptographic hash functions
Cryptography
Hashing

Add to Reading List

Source URL: www.eecs.harvard.edu

Download Document from Source Website

File Size: 1,14 MB

Share Document on Facebook

Similar Documents

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Public-key cryptography / Key management / Homomorphic encryption / NTRU / Lattice problem / SWIFFT / Cryptographic hash function / Key / Lattice

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

DocID: 1pUoS - View Document

Guidelines for managing the endangered Growling Grass Frog in urbanising landscapes Geoffrey Heard, Michael Scroggie and Nick Clemann 2010

DocID: 1lADF - View Document

SWIFFT: A Modest Proposal for FFT Hashing Vadim Lyubashevsky1, Daniele Micciancio1 , Chris Peikert2, , and Alon Rosen3 1 University of California at San Diego

DocID: 1lyrp - View Document

Cryptography / Lattice points / Post-quantum cryptography / Computational number theory / Linear algebra / Lattice-based cryptography / Lattice problem / Lattice / SWIFFT / Mathematics / Algebra / Abstract algebra

Lattice-based Cryptography Daniele Micciancio∗ Oded Regev† July 22, 2008

DocID: 14vOf - View Document

Hashing / Search algorithms / SHA-2 / Collision resistance / Collision attack / Fast Fourier transform / Hash function / MD4 / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

DocID: 12NLC - View Document