Provably secure cryptographic hash function

Results: 30



#Item
11Multicollision Attacks on Some Generalized Sequential Hash Functions

Multicollision Attacks on Some Generalized Sequential Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:57:26
12Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:57:42
13SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:52:44
14Provably Secure FFT Hashing

Provably Secure FFT Hashing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:50:36
15Desiderata for Future Hash Functions?

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
16Classification of Hash Functions Suitable for Real-life Systems

Classification of Hash Functions Suitable for Real-life Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:53:32
17A Note on the security proof of Knudsen-Preneel construction of a hash function

A Note on the security proof of Knudsen-Preneel construction of a hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:26:04
18C:�uments and Settings�ydlo�Documents�PCTeX Files�1pad�pp-yinszydlosept21.DVI

C:uments and SettingsydloDocumentsPCTeX Files1padpp-yinszydlosept21.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:20:00
19SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:30:12
20Univerzita Karlova v Praze Matematicko-fyzik´ aln´ı fakulta ´ PRACE ´

Univerzita Karlova v Praze Matematicko-fyzik´ aln´ı fakulta ´ PRACE ´

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2006-05-03 13:59:43