Security of cryptographic hash functions

Results: 47



#Item
21Artificial intelligence / Information retrieval / Bloom filter / Hash function / Cryptographic hash functions / Hash table / Password / Rainbow table / Password strength / Search algorithms / Hashing / Cryptography

An Algorithm for Approximate Membership Checking With Application to Password Security Udi Manber1 and Sun Wu Department of Computer Science University of Arizona

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-23 23:03:02
22Cryptographic hash functions / CRYPTREC / SC2000 / Hierocrypt / FIPS 140-2 / Symmetric-key algorithm / CIPHERUNICORN-E / SHA-1 / CIPHERUNICORN-A / Cryptography / Cryptography standards / Block ciphers

4-9 C  RYPTREC Activities KUROKAWA Takashi and KANAMORI Sachiko In this paper, we show the activity of CRYPTREC between fiscal year 2006 and fiscal year 2010 in the security fundamentals group. We focus on compromise an

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:09:35
23Law / The quick brown fox jumps over the lazy dog / Typography / Fingerprint / Expert witness / Forensic science / Evidence / MD5 / SHA-1 / Cryptographic hash functions / Evidence law / Cryptography

Lessons from prosecutions of Child Pornography and other “prohibited” material Ajoy Ghosh, Security Executive [removed] © Logica 2008.

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2009-03-31 21:25:01
24Random oracle / Oracle machine / Hash function / One-way compression function / Cryptography / Cryptographic hash functions / Merkle–Damgård construction

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 Center for Information Security Technologies(CIST), Korea Universit

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-03-05 01:27:34
25United States government secrecy / Computing / MD5 / SHA-2 / National Security Agency / SHA-1 / Federal Bureau of Investigation / Password / For Official Use Only / Security / National security / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2015-02-05 23:38:09
26Threefish / Skein / NIST hash function competition / SHA-1 / SHA-2 / Tiny Encryption Algorithm / MD5 / Differential cryptanalysis / Churning / Cryptography / Error detection and correction / Cryptographic hash functions

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-24 03:49:53
27Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
28Cryptographic hash functions / NIST hash function competition / Electronic submission

This workshop considers the full range of public key technology used for security decisions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:57:34
29One-way compression function / Hash function / Collision attack / Collision resistance / Provably secure cryptographic hash function / GOST / Cryptographic hash functions / Cryptography / Hashing

A Note on the security proof of Knudsen-Preneel construction of a hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:26:04
30HMAC / Hashing / Advantage / Pseudorandom function family / Function / Information theory / Random oracle / Cryptography / Message authentication codes / Cryptographic hash functions

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37
UPDATE