1
by Jamil, Norziana
Published 2013
... used by these cryptographic hash functions, linear message expansion and poor difusion in the step...
View full text
Thesis
2
by Jamil, Norziana
Published 2013
... used by these cryptographic hash functions, linear message expansion and poor difusion in the step...
View full text
Thesis
3
Thesis Book
4
Published 2010
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ... Attack -- Cryptographic Hash Functions I -- Hash Functions from Sigma Protocols and Improvements to VSH...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... -- Elliptic Curve Cryptography -- Cryptographic Hash Functions -- Block Cipher Cryptanalysis -- Chaos-Based...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... Cryptographic Hash Function -- Security Analysis of a 2/3-Rate Double Length Compression Function in the Black...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ... Based Cryptographic Hash Functions -- Cryptographic Protocols -- Optimization of Electronic First-Bid...
View full text
Electronic eBook
10
11
Published 2010
Table of Contents: ... -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... Collisions, or Why CRHF Combiners Have a Long Output -- Constructing Cryptographic Hash Functions from Fixed...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ... Databases from Cryptographic Hash Functions....
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ... -- New Results on the Key Scheduling Algorithm of RC4 -- Cryptographic Hash Functions -- Two Attacks...
View full text
Electronic eBook
16
Published 2014
Table of Contents: ... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ... Midnight Wish Cryptographic Hash Function -- Optimization of Adaptive Petri-Net Grid Genetic Algorithm...
View full text
Electronic eBook
18
View full text
Electronic eBook
19
View full text
Electronic eBook