Secure Hash Algorithms

Results: 25



#Item
1Hashing / Information retrieval / Cryptography / Information science / Search algorithms / Elliptic curves / Error detection and correction / Analytic number theory / Elliptic curve / Supersingular elliptic curve / Hash function / BonehLynnShacham

Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories ECC Workshop 2013, 2013–09–17

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-10-09 09:45:18
2Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English
3Error detection and correction / Search algorithms / Hash function / MD5 / Collision / SHA-1 / Hash list / Claw-free permutation / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:44:47
4Hashing / Search algorithms / SHA-2 / Collision resistance / Collision attack / Fast Fourier transform / Hash function / MD4 / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 19:34:48
5Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 14:07:22
6Oram / Time complexity / Hash table / Circuit / Binary tree / Theoretical computer science / Applied mathematics / Analysis of algorithms

SCORAM: Oblivious RAM for Secure Computation ∗ Xiao Shaun Wang

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2014-09-26 10:55:17
7Computing / Information / Cryptographic hash functions / Error detection and correction / Hash table / Hash function / Trie / Lookup table / Secure multi-party computation / Hashing / Search algorithms / Cryptography

Fast Privacy-Preserving Top-𝑘 Queries using Secret Sharing (Invited Paper) Martin Burkhart Xenofontas Dimitropoulos

Add to Reading List

Source URL: sepia.ee.ethz.ch

Language: English - Date: 2011-01-06 04:06:32
8Mathematics / Search algorithms / Multiset / Hash function / Collision resistance / MD5 / SHA-1 / Collision / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking Dwaine Clarke? , Srinivas Devadas, Marten van Dijk?? , Blaise Gassend, G. Edward Suh MIT Computer Science and Artificial Intelligence

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
9Hashing / Search algorithms / Password / SHA-2 / Hash function / Crypt / Salt / PBKDF2 / Bcrypt / Cryptography / Cryptographic hash functions / Cryptographic software

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
10Error detection and correction / Computing / Computer programming / Search algorithms / Treap / Hash tree / Hash function / Binary search tree / Cryptographic hash function / Cryptography / Hashing / Binary trees

Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure Tobias Pulls Roel Peeters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 08:57:40
UPDATE