Provably secure cryptographic hash function

Results: 30



#Item
21Collision attack / Collision resistance / Institute for Applied Information Processing and Communications / Hash function / Collision / Vincent Rijmen / Public key fingerprint / Provably secure cryptographic hash function / Preimage attack / Cryptography / Cryptographic hash functions / Hashing

Microsoft PowerPoint - HashIntro_talk1

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
22One-way function / Digital signature / MD5 / Provably secure cryptographic hash function / Cryptography / Cryptographic hash function / Hash function

Pricing via Processing or Combatting Junk Mail∗

Add to Reading List

Source URL: web.cs.dal.ca

Language: English - Date: 2009-06-17 14:01:01
23Electronic commerce / RSA / Digital signature / Random oracle / Provably secure cryptographic hash function / Index of cryptography articles / Cryptography / Public-key cryptography / Cryptographic hash functions

ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-07-13 05:54:26
24Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
25Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
26Fast Syndrome Based Hash / Hash function / Linear code / MD5 / Collision resistance / SHA-2 / Low-density parity-check code / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2007-05-11 03:26:00
27Preimage attack / Collision attack / HMAC / Random oracle / Collision resistance / Hash function / Collision / One-way compression function / Provably secure cryptographic hash function / Cryptography / Cryptographic hash functions / Hashing

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:09:17
28Search algorithms / Provably secure cryptographic hash function / Applied mathematics / Fast Syndrome Based Hash / Hash function / One-way function / Cyberwarfare / Collision resistance / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-05 07:41:01
29Hashing / Search algorithms / SHA-1 / SHA-2 / Hash function / Padding / HMAC / Bit array / Provably secure cryptographic hash function / Error detection and correction / Cryptographic hash functions / Cryptography

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 07:01:56
30Search algorithms / Collision attack / Preimage attack / Hash function / Collision / Merkle–Damgård construction / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-03-11 05:27:18
UPDATE