Cryptographic hash function

Results: 1121



#Item
41Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University   Adrian Perrig

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
42Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
43Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:08
44Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
45Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
46State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1  Cisco Systems, USA

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-04-06 13:04:46
47Note to other teachers and users of these slides: We would be delighted if you found this our material useful in giving your own lectures. Feel free to use these slides verbatim, or to modify them to fit your own needs.

Note to other teachers and users of these slides: We would be delighted if you found this our material useful in giving your own lectures. Feel free to use these slides verbatim, or to modify them to fit your own needs.

Add to Reading List

Source URL: mmds.org

Language: English - Date: 2014-08-11 12:24:56
48Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction Yanlin Li1 , Yueqiang Cheng1 , Virgil Gligor1(B) , and Adrian Perrig2 1  2

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction Yanlin Li1 , Yueqiang Cheng1 , Virgil Gligor1(B) , and Adrian Perrig2 1 2

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-12-08 03:13:02
49An Overview of DNSSEC August 04, 2011. Carlos Martínez-Cagnazzo	 
 carlos @ lacnic.net

An Overview of DNSSEC August 04, 2011. Carlos Martínez-Cagnazzo carlos @ lacnic.net

Add to Reading List

Source URL: www.labs.lacnic.net

Language: English - Date: 2011-09-08 15:41:30
50Microsoft Word - Indo-US-Workshop-jaja.doc

Microsoft Word - Indo-US-Workshop-jaja.doc

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2009-05-12 14:48:13