Secure Hash Algorithms

Results: 25



#Item
11Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada  {bo.zhu,x5fan,ggong}@uwaterloo.

Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {bo.zhu,x5fan,ggong}@uwaterloo.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-12 12:07:46
12Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present security proofs for the BLT signature scheme in the mode

Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present security proofs for the BLT signature scheme in the mode

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-04 03:31:48
13SCORAM: Oblivious RAM for Secure Computation  ∗ Xiao Shaun Wang

SCORAM: Oblivious RAM for Secure Computation ∗ Xiao Shaun Wang

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-15 11:47:32
14X-Sieve: CMU Sieve 2.2 From: Tolga Acar <Tolga.Acar@microsoft.com> To: CC: Brian LaMacchia Date: Fri, 27 Apr 2007 15:44:15 -0700 Subject: Has" title="X-Sieve: CMU Sieve 2.2 From: Tolga Acar To: "hash-function@nist.gov" CC: Brian LaMacchia Date: Fri, 27 Apr 2007 15:44:15 -0700 Subject: Has" class="img-responsive img-polaroid">

X-Sieve: CMU Sieve 2.2 From: Tolga Acar To: "hash-function@nist.gov" CC: Brian LaMacchia Date: Fri, 27 Apr 2007 15:44:15 -0700 Subject: Has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:55:18
15On the Communication Complexity of Secure Function Evaluation with Long Output Pavel Hub´aˇcek∗ Daniel Wichs†

On the Communication Complexity of Secure Function Evaluation with Long Output Pavel Hub´aˇcek∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 12:48:08
16[Federal Register: September 12, 1997 (Volume 62, Number 177)]

[Federal Register: September 12, 1997 (Volume 62, Number 177)]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:13:28
17Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:57:42
18Desiderata for Future Hash Functions?

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
19SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:30:12
20Five DRBG Algorithms Based on Hash Functions and Block Ciphers

Five DRBG Algorithms Based on Hash Functions and Block Ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:06:54