Provably secure cryptographic hash function

Results: 30



#Item
21Microsoft PowerPoint - HashIntro_talk1

Microsoft PowerPoint - HashIntro_talk1

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
22Pricing via Processing or Combatting Junk Mail∗

Pricing via Processing or Combatting Junk Mail∗

Add to Reading List

Source URL: web.cs.dal.ca

Language: English - Date: 2009-06-17 14:01:01
23ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-07-13 05:54:26
24Provably Secure Cryptographic Hash Functions

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
25Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
26

PDF Document

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2007-05-11 03:26:00
27

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:17
28

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-05 07:41:01
29

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:01:56
30

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-03-11 05:27:18