RIPEMD

Results: 39



#Item
1Cryptocurrencies / Financial technology / Bitcoin / Alternative currencies / Volunteer computing / NEM / SHA-3 / Multisignature / RIPEMD / Transmission Control Protocol

NEM Technical Reference Version 1.0 May 15, 2015

Add to Reading List

Source URL: nem.io

Language: English - Date: 2015-05-25 20:17:43
2

Introduction Description of RIPEMD-128 Finding a differential path

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2015-09-17 19:41:23
    3PKCS / Block cipher / Cryptographic hash function / CCM mode / ECRYPT / Symmetric-key algorithm / Cryptography / Cryptography standards / RIPEMD

    ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2013-03-26 12:08:56
    4SHA-1 / RIPEMD / Hash function / Crypt / Hash list / MD4 / MD5 / Cryptographic hash functions / Cryptography / SHA-2

    Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Hash Functions —

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-05-28 08:15:33
    5Hashing / MD5 / SHA-1 / MD4 / RIPEMD / Crypt / Padding / Digital signature / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

    Contents I Table of Contents Part I Introduction

    Add to Reading List

    Source URL: www.bytefusion.com

    Language: English - Date: 2007-05-31 21:17:32
    6SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

    Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-11-20 08:25:40
    7SHA-1 / Preimage attack / SHA-2 / Differential cryptanalysis / RIPEMD / MD4 / Collision attack / MD5 / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

    Improved Boomerang Attacks on Round-Reduced SM3 and Keyed Permutation of BLAKE-256? Dongxia Bai1 , Hongbo Yu1?? , Gaoli Wang2 , Xiaoyun Wang3,4,5 1 Department of Computer Science and Technology, Tsinghua University, Bei

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-04-07 11:46:12
    8SHA-1 / MD4 / MD5 / Differential cryptanalysis / RIPEMD / Hamming weight / A5/1 / ICE / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

    Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-19 18:19:12
    9MD4 / MD5 / RIPEMD / Hans Dobbertin / HAVAL / SHA-1 / Comparison of cryptographic hash functions / Hash function / Collision / Cryptography / Cryptographic hash functions / Hashing

    Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD Xiaoyun Wang1, Dengguo Feng2, Xuejia Lai3, Hongbo Yu1

    Add to Reading List

    Source URL: techheap.packetizer.com

    Language: English - Date: 2004-08-18 20:15:31
    10MD4 / SHA-2 / SHA-1 / RIPEMD / MD5 / Hash function / Keccak / MD2 / Crypt / Error detection and correction / Cryptographic hash functions / Cryptography

    CA642: C RYPTOGRAPHY AND N UMBER T HEORY 8 1

    Add to Reading List

    Source URL: www.computing.dcu.ie

    Language: English - Date: 2014-10-30 10:52:49
    UPDATE