SHA-2

Results: 893



#Item
801Census tract / Fairfield /  Connecticut / Connecticut / Hope Township /  New Jersey / Census / Statistics / Stamford /  Connecticut / Geography of the United States

Microsoft Word - Hope-VI_CCEA-2-SHA_2011jun_authors-date-posting

Add to Reading List

Source URL: ccea.uconn.edu

Language: English - Date: 2012-10-19 13:52:22
802Hashing / SHA-2 / SHA-1 / Keccak / NIST hash function competition / Secure Hash Standard / Crypt / Hash function / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-09 12:06:39
803Preimage attack / Keccak / SHA-2 / Crypt / NIST hash function competition / Hash function / Lamport signature / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-05 14:22:31
804SHA-1 / Preimage attack / SHA-2 / MD5 / ICE / S-box / Hash function / Differential cryptanalysis / VEST / Cryptography / Error detection and correction / Cryptographic hash functions

Finding Collisions for Reduced Luffa-256 v2 Bart Preneel2 , Hirotaka Yoshida12 , and Dai Watanabe1 1

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2014-03-19 02:03:06
805Computing / Error detection and correction / Search algorithms / Hash function / SHA-2 / Hash list / Hash table / Crypt / Rsync / Cryptographic hash functions / Cryptography / Hashing

digital investigation 3S[removed]S91–S97 available at www.sciencedirect.com

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-03-18 21:36:24
806MD4 / SHA-2 / SHA-1 / MD5 / Collision attack / MD2 / Collision resistance / One-way function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Preimage attack

MD4 is Not One-Way Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-11-30 19:44:46
807SHA-2 / SHA-1 / Preimage attack / Padding / Advanced Encryption Standard / NIST hash function competition / Block cipher / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

The SHAvite-3 Hash Function Tweaked Version[removed]

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2009-11-23 10:40:19
808Collision attack / SHA-2 / Merkle–Damgård construction / Cyberwarfare / Security / Cryptographic hash functions / Preimage attack / Espionage

Converting MITM Preimage Attack into Pseudo Collision Attack: Application to SHA-2

Add to Reading List

Source URL: fse2012.inria.fr

Language: English - Date: 2012-04-10 05:19:43
809Cryptography / NIST hash function competition / SHA-2 / Hash function / SHA-1 / MD5 / Hash tree / Keccak / HMAC / Error detection and correction / Cryptographic hash functions / Hashing

BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1 , Samuel Neves2 , Zooko Wilcox-O’Hearn3 , and Christian Winnerlein4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-26 14:43:26
810NIST hash function competition / SHA-2 / Preimage attack / SHA-1 / MD5 / Skein / Threefish / MD4 / Rotational cryptanalysis / Cryptography / Error detection and correction / Cryptographic hash functions

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 and Christian Rechberger2 and Alexandra Savelieva3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-07 10:17:20
UPDATE