Padding

Results: 316



#Item
291Pseudorandomness / Feistel cipher / ICE / Block cipher / Pseudorandom function family / Commitment scheme / Advantage / Exclusive or / Optimal asymmetric encryption padding / Cryptography / Permutations / Unpredictable permutation

PDF Document

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2006-11-27 11:45:50
292SHA-2 / SHA-1 / Preimage attack / Padding / Advanced Encryption Standard / Block cipher / NIST hash function competition / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:28
293Hashing / NIST hash function competition / Advanced Encryption Standard / Merkle–Damgård construction / SHA-1 / Padding / RadioGatún / HMAC / Grøstl / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:01
294Hashing / Search algorithms / SHA-1 / SHA-2 / Hash function / Padding / HMAC / Bit array / Provably secure cryptographic hash function / Error detection and correction / Cryptographic hash functions / Cryptography

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:01:56
295Hashing / NIST hash function competition / One-way compression function / Padding / Block cipher / Hash function / HMAC / Collision attack / ICE / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:06:39
296Hashing / Padding / Perm / Hash function / Merkle–Damgård construction / One-way compression function / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-13 07:16:54
297Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / IEEE P1363 / RSA / Key encapsulation / Integrated Encryption Scheme / Chosen-ciphertext attack / Block cipher modes of operation / Random oracle / Cryptography / Cryptography standards / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2001-12-20 09:11:15
298Random oracle / Oracle machine / Advantage / One-way function / Standard model / Hard-core predicate / Pseudorandom generator / Oracle Corporation / Optimal asymmetric encryption padding / Cryptography / Cryptographic hash functions / Pseudorandomness

PDF Document

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 12:18:15
299Initialization vector / Ciphertext / Stream cipher / Symmetric-key algorithm / Substitution cipher / Ciphertext stealing / Cipher / Padding / Block size / Cryptography / Block cipher modes of operation / Block cipher

PDF Document

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
300Cryptography / Atmel AVR / Padding / Computing / Electronic engineering / NIST hash function competition / CubeHash / Microcontrollers

PDF Document

Add to Reading List

Source URL: cubehash.cr.yp.to

Language: English - Date: 2008-10-30 10:40:17
UPDATE