<--- Back to Details
First PageDocument Content
Search algorithms / Preimage attack / Collision attack / MD5 / Random oracle / Collision resistance / SHA-1 / Hash chain / Collision / Cryptography / Cryptographic hash functions / Hashing
Date: 2006-03-20 09:54:54
Search algorithms
Preimage attack
Collision attack
MD5
Random oracle
Collision resistance
SHA-1
Hash chain
Collision
Cryptography
Cryptographic hash functions
Hashing

Add to Reading List

Source URL: www.cs.ut.ee

Download Document from Source Website

File Size: 141,38 KB

Share Document on Facebook

Similar Documents

Routing protocols / Hashing / Error detection and correction / Routing algorithms / Distributed data storage / Hash chain / Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Merkle tree / Cryptographic hash function / Distance-vector routing protocol

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

DocID: 1phYN - View Document

Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

DocID: 1oDfz - View Document

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The Netherlands

DocID: 1mkCs - View Document

Artificial intelligence / Cryptography / Hash table / Information science / Hash function / Hash chain / Cryptographic hash functions / Search algorithms / Hashing / Information retrieval

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science

DocID: 18LEA - View Document

Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

DocID: 180eG - View Document