Cryptographic hash function

Results: 1121



#Item
101Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-09 19:41:15
    102- Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

    - Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    Language: English - Date: 2015-08-13 01:39:17
    103RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.

    RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.

    Add to Reading List

    Source URL: www.ietf.org

    Language: English - Date: 2015-07-23 10:29:05
    104Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03).  The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

    Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

    Add to Reading List

    Source URL: www.oceanstore.org

    Language: English - Date: 2003-03-13 15:50:35
    105SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

    SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

    Add to Reading List

    Source URL: cryptojedi.org

    Language: English - Date: 2014-10-04 10:08:48
    106SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin  Tiffany Hyun-Jin Kim

    SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    107A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1  2

    A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:26
    108Validating Web Content with Senser Jordan Wilberding Georgetown University Andrew Yates Georgetown University

    Validating Web Content with Senser Jordan Wilberding Georgetown University Andrew Yates Georgetown University

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2013-10-29 13:52:26
    109

    PDF Document

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:23
    110Deterministic wallets  End Deterministic wallets Gregory Maxwell et. al.

    Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

    Add to Reading List

    Source URL: www.cs.technion.ac.il

    Language: English - Date: 2014-05-26 22:22:44