Universal one-way hash function

Results: 16



#Item
11http://www.ietf.org/internet-drafts/draft-irtf-cfrg-rhash-00.txt

http://www.ietf.org/internet-drafts/draft-irtf-cfrg-rhash-00.txt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:38:38
12Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:12:02
13Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
14Provably Secure Cryptographic Hash Functions

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
15How to Time-Stamp a Digital Document Stuart Haber [removed]

How to Time-Stamp a Digital Document Stuart Haber [removed]

Add to Reading List

Source URL: www.anf.es

Language: English - Date: 2005-10-21 03:07:32
16

PDF Document

Add to Reading List

Source URL: www.cs.ucdavis.edu

Language: English - Date: 2004-02-12 14:18:41