Secure Hash Algorithms

Results: 25



#Item
11Hashing / Search algorithms / Keccak / SHA-2 / Hash function / SHA-1 / Password / Salt / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {bo.zhu,x5fan,ggong}@uwaterloo.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-12 12:07:46
12Error detection and correction / Search algorithms / Random oracle / Hash tree / Hash function / Hash chain / Oracle machine / Hash list / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present security proofs for the BLT signature scheme in the mode

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-04 03:31:48
13Oram / Time complexity / Hash table / Circuit / Binary tree / Theoretical computer science / Applied mathematics / Analysis of algorithms

SCORAM: Oblivious RAM for Secure Computation ∗ Xiao Shaun Wang

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-15 11:47:32
14Search algorithms / Hash function / Information retrieval / Artificial intelligence / Information science / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

X-Sieve: CMU Sieve 2.2 From: Tolga Acar To: "hash-function@nist.gov" CC: Brian LaMacchia Date: Fri, 27 Apr 2007 15:44:15 -0700 Subject: Has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:55:18
15Electronic commerce / Hashing / Computational complexity theory / Search algorithms / RSA / Cryptographic hash function / Communication complexity / Hash function / Homomorphic encryption / Cryptography / Theoretical computer science / Applied mathematics

On the Communication Complexity of Secure Function Evaluation with Long Output Pavel Hub´aˇcek∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 12:48:08
16Hashing / SHA-2 / SHA-1 / Search algorithms / Crypt / Secure Hash Standard / NIST hash function competition / Collision attack / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

[Federal Register: September 12, 1997 (Volume 62, Number 177)]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:13:28
17Hashing / Hash function / Merkle–Damgård construction / Information retrieval / Artificial intelligence / Applied mathematics / Provably secure cryptographic hash function / Collision resistance / Cryptographic hash functions / Cryptography / Search algorithms

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:57:42
18Error detection and correction / Search algorithms / Hash function / Merkle–Damgård construction / Preimage attack / Hash list / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
19Hashing / Hash function / Applied mathematics / Truncation / SHA-2 / Mathematics / Artificial intelligence / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Search algorithms

SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:30:12
20Hashing / Block cipher / Cryptographic hash functions / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Randomness / Pseudorandom number generators

Five DRBG Algorithms Based on Hash Functions and Block Ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:06:54
UPDATE