Provably secure cryptographic hash function

Results: 30



#Item
11Hash function / Collision attack / Birthday attack / Collision / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Preimage attack

Multicollision Attacks on Some Generalized Sequential Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:57:26
12Hashing / Hash function / Merkle–Damgård construction / Information retrieval / Artificial intelligence / Applied mathematics / Provably secure cryptographic hash function / Collision resistance / Cryptographic hash functions / Cryptography / Search algorithms

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:57:42
13SHA-1 / SHA-2 / Merkle–Damgård construction / Hash function / Crypt / Provably secure cryptographic hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:52:44
14Collision resistance / Mathematics / Hash function / SWIFFT / Applied mathematics / Fast Fourier transform / Cyberwarfare / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Digital signal processing

Provably Secure FFT Hashing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:50:36
15Error detection and correction / Search algorithms / Hash function / Merkle–Damgård construction / Preimage attack / Hash list / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
16Cryptography / Collision resistance / Hash function / Hash list / SHA-2 / Collision / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Hashing

Classification of Hash Functions Suitable for Real-life Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:53:32
17One-way compression function / Hash function / Collision attack / Collision resistance / Provably secure cryptographic hash function / GOST / Cryptographic hash functions / Cryptography / Hashing

A Note on the security proof of Knudsen-Preneel construction of a hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:26:04
18Collision attack / SHA-2 / MD5 / Hash function / MD4 / RSA / Provably secure cryptographic hash function / One-way compression function / Cryptography / Cryptographic hash functions / SHA-1

C:uments and SettingsydloDocumentsPCTeX Files1padpp-yinszydlosept21.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:20:00
19Hashing / Hash function / Applied mathematics / Truncation / SHA-2 / Mathematics / Artificial intelligence / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Search algorithms

SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:30:12
20MD4 / Hash function / Preimage attack / Provably secure cryptographic hash function / Collision attack / Cryptography / Cryptographic hash functions / MD5

Univerzita Karlova v Praze Matematicko-fyzik´ aln´ı fakulta ´ PRACE ´

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2006-05-03 13:59:43
UPDATE