First Page | Document Content | |
---|---|---|
![]() Date: 2006-03-20 09:54:54Search algorithms Preimage attack Collision attack MD5 Random oracle Collision resistance SHA-1 Hash chain Collision Cryptography Cryptographic hash functions Hashing | Source URL: www.cs.ut.eeDownload Document from Source WebsiteFile Size: 141,38 KBShare Document on Facebook |
![]() | Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian PerrigDocID: 1phYN - View Document |
![]() | SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian PerrigDocID: 1oDfz - View Document |
![]() | Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal Berry Schoenmakers Dept of Mathematics & Computer Science TU Eindhoven, The NetherlandsDocID: 1mkCs - View Document |
![]() | Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer ScienceDocID: 18LEA - View Document |
![]() | iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2DocID: 180eG - View Document |