Security of cryptographic hash functions

Results: 47



#Item
31Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cam

Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cam

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
32Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
33Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen  IBM Almaden Research Center

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
34Report on Present State of ESIGN Signature Evaluation (full evaluation) January 28, 2002 Yasuyuki Sakai, Member Public-Key Cryptography

Report on Present State of ESIGN Signature Evaluation (full evaluation) January 28, 2002 Yasuyuki Sakai, Member Public-Key Cryptography

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
35Comments Received on the Second Review of SP 800‐131  (Recommendation for the Transitioning of Cryptographic Algorithms and  Key Lengths)  Lovell King II, Dept. of State .............................

Comments Received on the Second Review of SP 800‐131  (Recommendation for the Transitioning of Cryptographic Algorithms and  Key Lengths)  Lovell King II, Dept. of State .............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-07 11:29:16
36SHA-3 Conference, March 2012, Provable Security of BLAKE with Non-Ideal Commpressio Function

SHA-3 Conference, March 2012, Provable Security of BLAKE with Non-Ideal Commpressio Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:14:18
37SHA-3 Conference, March 2012, Security Analysis and Commparison of the SHA-3 Finalists

SHA-3 Conference, March 2012, Security Analysis and Commparison of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:31:40
38This workshop considers the full range of public key technology used for security decisions

This workshop considers the full range of public key technology used for security decisions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:51:26
39Cryptographic Technology Group Lily Chen, Acting Manager of CTG June 4, 2013 Z  M (padded)

Cryptographic Technology Group Lily Chen, Acting Manager of CTG June 4, 2013 Z M (padded)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-04 17:39:21
402003 CYBER CRIME CONFERENCE Effectiveness of Hash Sets Douglas White National Institute of Standards & Technology

2003 CYBER CRIME CONFERENCE Effectiveness of Hash Sets Douglas White National Institute of Standards & Technology

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2003-12-09 19:03:52