Security of cryptographic hash functions

Results: 47



#Item
1Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe  Christopher Collins

Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
2Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper  1

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
3PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-12-09 05:42:43
4.  . Security Reductions of Cryptographic Hash Functions .

. . Security Reductions of Cryptographic Hash Functions .

Add to Reading List

Source URL: www1.spms.ntu.edu.sg

Language: English - Date: 2011-08-31 02:03:42
    5.  . Security Reductions of Cryptographic Hash Functions .

    . . Security Reductions of Cryptographic Hash Functions .

    Add to Reading List

    Source URL: web.spms.ntu.edu.sg

    Language: English - Date: 2012-03-13 12:15:13
      6Provable Security of Cryptographic Hash Functions  Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

      Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English - Date: 2012-08-24 06:11:58
        7Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

        Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

        Add to Reading List

        Source URL: www.easycrypt.info

        Language: English - Date: 2015-06-04 11:02:41
        81  On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+

        1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+

        Add to Reading List

        Source URL: www.cs.cuhk.hk

        Language: English - Date: 2011-05-19 23:15:34
        9Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

        Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G

        Add to Reading List

        Source URL: certicrypt.gforge.inria.fr

        Language: English
        10ICH M2 EWG Work Plan 13 March 2015 Topic Adopted: 1994 Last Face-to-Face Meeting: Lisbon, November 2014 The following roles and responsibilities of M2 were approved by the SC: 1) Provide overview of ICH and SDO technical

        ICH M2 EWG Work Plan 13 March 2015 Topic Adopted: 1994 Last Face-to-Face Meeting: Lisbon, November 2014 The following roles and responsibilities of M2 were approved by the SC: 1) Provide overview of ICH and SDO technical

        Add to Reading List

        Source URL: www.ich.org

        Language: English - Date: 2015-04-02 02:41:29