Back to Results
First PageMeta Content
Hashing / Message authentication codes / SHA-2 / Collision resistance / SHA-1 / HMAC / Universal one-way hash function / MD5 / Random oracle / Cryptographic hash functions / Cryptography / Error detection and correction


Cryptographic Hash Workshop[removed]Classification of Hash Functions Suitable for Real-life Systems Paper
Add to Reading List

Document Date: 2012-06-20 09:54:18


Open Document

File Size: 485,31 KB

Share Result on Facebook

City

Tokyo / /

Company

Whirlpool / NTT DATA Corporation / /

Country

United States / /

Event

FDA Phase / /

Facility

National Institute of Information / /

IndustryTerm

real-life information systems / secure communication protocols / authentica tion protocols / security products / time-stamping services / information systems / security systems / real-life protocols / extended force search / healthcare systems / wireless networks / real-life systems / e-governments / light-weight algorithm / information communication systems / level security systems / time-stamp technology / cryptographic systems / software / cryptographic algorithms / software download / collision search / few hash algorithms / e-government / se security systems / download systems / handshake protocol / content delivery services / low-power devices / Internet Key Exchange / search space / hash function systems / ser vices through systems / search database systems / security protocols / software application / /

OperatingSystem

FORK / /

Organization

National Security Agency / U.S. Securities and Exchange Commission / National Institute of Information and Communications Technol / Time Stamping Authority / US Federal Reserve / PKI / Certiļ¬cate Authority / /

Person

Ronald Rivest / Takashi Kurokawa / /

Position

driver / system engineer / representative / judge / /

Product

IEEE802 / SSL / /

Technology

S/MIME / public key infrastructure / light-weight algorithm / PKI / block cipher / security protocols / APOP protocol / secret key / Time Stamping protocol / SSL / public key encryption / encryption / linking protocol / real-life protocols / secure communication protocols / Public Key / authentica tion protocols / dom / 2.1 Protocols / e-mail encryption / Digital Signature / few hash algorithms / handshake protocol / time-stamp technology / /

SocialTag