Security of cryptographic hash functions

Results: 47



#Item
21An Algorithm for Approximate Membership Checking With Application to Password Security Udi Manber1 and Sun Wu Department of Computer Science University of Arizona

An Algorithm for Approximate Membership Checking With Application to Password Security Udi Manber1 and Sun Wu Department of Computer Science University of Arizona

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-23 23:03:02
224-9 C  RYPTREC Activities KUROKAWA Takashi and KANAMORI Sachiko In this paper, we show the activity of CRYPTREC between fiscal year 2006 and fiscal year 2010 in the security fundamentals group. We focus on compromise an

4-9 C  RYPTREC Activities KUROKAWA Takashi and KANAMORI Sachiko In this paper, we show the activity of CRYPTREC between fiscal year 2006 and fiscal year 2010 in the security fundamentals group. We focus on compromise an

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:09:35
23Lessons from prosecutions of Child Pornography and other “prohibited” material Ajoy Ghosh, Security Executive [removed]  © Logica 2008.

Lessons from prosecutions of Child Pornography and other “prohibited” material Ajoy Ghosh, Security Executive [removed] © Logica 2008.

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2009-03-31 21:25:01
24Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1  Center for Information Security Technologies(CIST), Korea Universit

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-free Padding Donghoon Chang1 , Sangjin Lee1 , Mridul Nandi2 , and Moti Yung3 1 Center for Information Security Technologies(CIST), Korea Universit

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-03-05 01:27:34
25

PDF Document

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2015-02-05 23:38:09
26Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-24 03:49:53
27Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare  University of California San Diego, [removed]

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
28This workshop considers the full range of public key technology used for security decisions

This workshop considers the full range of public key technology used for security decisions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:57:34
29A Note on the security proof of Knudsen-Preneel construction of a hash function

A Note on the security proof of Knudsen-Preneel construction of a hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:26:04
30The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37