Cryptographic hash functions

Results: 1068



#Item
81Introduction  MD New Results I

Introduction MD New Results I

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
82The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:56
83Provable Security of Cryptographic Hash Functions  Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

Add to Reading List

Source URL: web.spms.ntu.edu.sg

Language: English - Date: 2012-08-24 06:11:58
    84How to Time-Stamp a Digital Document Stuart Haber  W. Scott Stornetta

    How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

    Add to Reading List

    Source URL: www.anf.es

    Language: English - Date: 2014-05-12 07:16:17
    85Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03).  The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

    Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

    Add to Reading List

    Source URL: www.oceanstore.org

    Language: English - Date: 2003-03-13 15:50:35
    86A New Approach to Practical Active-Secure Two-Party Computation 1 1

    A New Approach to Practical Active-Secure Two-Party Computation 1 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-02-14 09:50:59
    87Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

    Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

    Add to Reading List

    Source URL: www.easycrypt.info

    Language: English - Date: 2015-06-04 11:02:41
    88WHEN: WHERE: Turn west at Calen (half way between Mackay & Proserpine) and 12km to the Wintermoon Camp Site.

    WHEN: WHERE: Turn west at Calen (half way between Mackay & Proserpine) and 12km to the Wintermoon Camp Site.

    Add to Reading List

    Source URL: www.hhh.asn.au

    Language: English - Date: 2015-06-02 06:19:43
    89Supplementary Material for “Compact Hyperplane Hashing with Bilinear Functions” Wei Liu†  Jun Wang‡

    Supplementary Material for “Compact Hyperplane Hashing with Bilinear Functions” Wei Liu† Jun Wang‡

    Add to Reading List

    Source URL: www.sanjivk.com

    Language: English - Date: 2012-06-12 10:11:42
    90CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

    CAVP 試験可能な暗号アルゴリズム一覧 () © 2014 ECSEC Laboratory Inc. 大分類 公開鍵 (FIPS

    Add to Reading List

    Source URL: www.ecsec.jp

    Language: English - Date: 2014-09-26 04:10:08