Back to Results
First PageMeta Content
One-way compression function / Collision resistance / Quasigroup / Hash function / SHA-2 / SHA-1 / Collision attack / Collision / MD5 / Cryptographic hash functions / Cryptography / Preimage attack


Cryptographic Hash Workshop[removed]Edon-R Family of Cryptographic Hash Functions
Add to Reading List

Document Date: 2012-06-20 08:31:50


Open Document

File Size: 713,04 KB

Share Result on Facebook

City

La Jolla / Berlin / Skopje / Trondheim / /

Company

Quasigroup / Russell / John Wiley & Sons / /

Country

Germany / Norway / United States / Macedonia / /

/

Facility

Norwegian University of Science / Institute of Informatics / University of California San Diego / M. Hall / /

IndustryTerm

torial exhaustive search / idempotent law / effective algorithm / cryptographic protocols / non-abelian groups / algorithm ing systems / internet computing / hash algorithm / ever-growing computing power / nL3/3J different solutions / associative law / non linear systems / basic algorithm / commutative law / /

Organization

Institute for Nonlinear Science / Institute of Informatics / Centre for Quantifiable Quality of Service / Faculty of Natural Sciences and Mathematics / U.S. Securities and Exchange Commission / Norwegian University of Science and Technology / University of California San Diego / /

Person

Minimal Candi / Cryptographic Hash / /

Position

editor / /

Product

Franklin / /

ProgrammingLanguage

C / /

ProvinceOrState

California / Massachusetts / Cryptographic Hash / /

PublishedMedium

Communications of the ACM / Cryptology ePrint Archive / Lecture Notes in Computer Science / /

Technology

Cryptography / hash algorithm / public key / ASCII / dom / html / digital signature / effective algorithm / Stream Cipher / basic algorithm / /

URL

http /

SocialTag