Security of cryptographic hash functions

Results: 47



#Item
41PAIRS AND TRIPLETS OF DES S-BOXES Donald Davies Sean Murphy Information Security Group, Royal Holloway and Bedford New College,

PAIRS AND TRIPLETS OF DES S-BOXES Donald Davies Sean Murphy Information Security Group, Royal Holloway and Bedford New College,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:40
42On NT Password Security By: Jos Visser This article is (c) Copyright 1997 Open Solution Providers. It may be referred to or reproduced in full only with full retention of this copyright message. For more information on t

On NT Password Security By: Jos Visser This article is (c) Copyright 1997 Open Solution Providers. It may be referred to or reproduced in full only with full retention of this copyright message. For more information on t

Add to Reading List

Source URL: www.josvisser.nl

Language: English - Date: 2004-10-07 03:31:00
43Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young  Introduction

Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

Add to Reading List

Source URL: www.scienceandmathacademy.com

Language: English - Date: 2013-06-10 13:55:15
44Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

Security Analysis of SIMD Charles Bouillaguet, Pierre-Alain Fouque, and Gaëtan Leurent École Normale Supérieure – Département d’Informatique,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-01 05:47:23
45UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

UNIVERSITY OF NOVI SAD DEPARTMENT OF POWER, ELECTRONICS AND TELECOMMUNICATIONS

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
46ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

ANOTHER LOOK AT “PROVABLE SECURITY”. II NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. We discuss the question of how to interpret reduction arguments in cryptography. We give some examples to show the subtlety

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-07-13 05:54:26
47Security Proofs for the MD6 Hash Function Mode of Operation by

Security Proofs for the MD6 Hash Function Mode of Operation by

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-11-05 16:27:34