SHA-2

Results: 893



#Item
821Key management / HMAC / Cryptographic hash function / Key / CMAC / SHA-2 / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
822Preimage attack / Collision attack / HMAC / SHA-2 / Hash function / SMASH / MD5 / SHA-1 / One-way function / Cryptographic hash functions / Cryptography / Error detection and correction

SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-05-26 16:47:31
823Cryptographic hash functions / Randomness / SHA-1 / FIPS 140-2 / Digital Signature Algorithm / Advanced Encryption Standard / Algorithm / Elliptic Curve DSA / Random number generation / Cryptography / Cryptography standards / Pseudorandom number generators

The Random Number Generator Validation System (RNGVS) January 31, 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-05 00:00:00
824International Association for Plant Taxonomy / Plant taxonomy / Chromosome / Sha / Ploidy / Biology / Cytogenetics / Botanical nomenclature

55 (2) • May 2006: 443–445 Marhold • IAPT/IOPB Chromosome Data 1

Add to Reading List

Source URL: www.iopb.org

Language: English - Date: 2007-07-30 05:02:23
825Hashing / Preimage attack / SHA-1 / MD5 / NIST hash function competition / Collision resistance / Crypt / HMAC / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

The Hitchhiker's Guide to the SHA-3 Competition

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2012-07-04 01:21:00
826MD5 / MD4 / Collision attack / Venti / RIPEMD / Hash function / Wang Xiaoyun / SHA-2 / Cryptographic hash functions / Cryptography / SHA-1

Finding Collisions in the Full SHA-1 Xiaoyun Wang1, , Yiqun Lisa Yin2 , and Hongbo Yu3 1

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:28
827Tiger / SHA-1 / MD5 / Differential cryptanalysis / Block cipher / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / MD4

Collisions and Near-Collisions for Reduced-Round Tiger John Kelsey1 , Stefan Lucks2

Add to Reading List

Source URL: th.informatik.uni-mannheim.de

Language: English - Date: 2006-03-09 11:16:09
828Hashing / SHA-1 / SHA-2 / Collision attack / MD4 / Preimage attack / MD5 / Hash function / Collision resistance / Error detection and correction / Cryptography / Cryptographic hash functions

Further progress in hashing cryptanalysis∗ Arjen K. Lenstra Lucent Technologies, Bell Laboratories

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
829Hashing / Message authentication codes / Coding theory / HMAC / SHA-2 / MD5 / Key derivation function / Collision attack / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
830NIST hash function competition / Hashing / MD6 / MD5 / MD4 / SHA-2 / SHA-1 / Collision resistance / Preimage attack / Error detection and correction / Cryptography / Cryptographic hash functions

Security Proofs for the MD6 Hash Function Mode of Operation by

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-11-05 16:27:34
UPDATE