Cryptographic hash function

Results: 1121



#Item
941Further progress in hashing cryptanalysis∗ Arjen K. Lenstra Lucent Technologies, Bell Laboratories

Further progress in hashing cryptanalysis∗ Arjen K. Lenstra Lucent Technologies, Bell Laboratories

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:17
942How to Time-Stamp a Digital Document Stuart Haber [removed]

How to Time-Stamp a Digital Document Stuart Haber [removed]

Add to Reading List

Source URL: www.anf.es

Language: English - Date: 2005-10-21 03:07:32
943Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: imperia.rz.rub.de

Language: English - Date: 2009-12-11 06:33:14
944Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
945Second Preimage Attacks on Dithered Hash Functions Elena Andreeva1 , Charles Bouillaguet2 , Pierre-Alain Fouque2 ,

Second Preimage Attacks on Dithered Hash Functions Elena Andreeva1 , Charles Bouillaguet2 , Pierre-Alain Fouque2 ,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2008-02-11 08:25:42
946Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition

Add to Reading List

Source URL: www.shabal.com

Language: English - Date: 2009-01-14 05:49:51
947Security Proofs for the MD6 Hash Function Mode of Operation by

Security Proofs for the MD6 Hash Function Mode of Operation by

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2008-11-05 16:27:34
948Eindhoven University of Technology Department of Mathematics and Computing Science

Eindhoven University of Technology Department of Mathematics and Computing Science

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-07-05 06:20:54
949Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-03-15 18:18:40
950Microsoft Word - 3. High-Speed Parallel Architecture of the Whirlpool Hash Function

Microsoft Word - 3. High-Speed Parallel Architecture of the Whirlpool Hash Function

Add to Reading List

Source URL: www.sersc.org

Language: English - Date: 2009-07-31 02:54:04