Cryptographic hash function

Results: 1121



#Item
211  Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Using the New JDK 8 Security Features

1 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Using the New JDK 8 Security Features

Add to Reading List

Source URL: blogs.oracle.com

Language: English - Date: 2013-09-25 13:14:11
22Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1  Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
23An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-05-26 20:18:15
24Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
25Hybrid Use of Hashing Techniques for Spatial Data Wayne A. Davis Department of Computing Science The University of Alberta Edmonton, Alberta, Canada T6G 2H1

Hybrid Use of Hashing Techniques for Spatial Data Wayne A. Davis Department of Computing Science The University of Alberta Edmonton, Alberta, Canada T6G 2H1

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 01:13:26
26Elliptic Curve Abe-Okamoto-Suzuki Message Recovery Signature Scheme (ECAOS) Working DraftAugust 25,

Elliptic Curve Abe-Okamoto-Suzuki Message Recovery Signature Scheme (ECAOS) Working DraftAugust 25,

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
27Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Add to Reading List

Source URL: thmatters.files.wordpress.com

Language: English - Date: 2015-09-29 10:45:40
28An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-29 16:43:02
29Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
30A NEW PLATFORM FOR A NEW ERA  Apache Tomcat and SSL Mark Thomas, Staff Engineer, Pivotal

A NEW PLATFORM FOR A NEW ERA Apache Tomcat and SSL Mark Thomas, Staff Engineer, Pivotal

Add to Reading List

Source URL: home.apache.org

Language: English - Date: 2015-03-01 12:30:36