Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
"cryptographic hash function" » "cryptographic hash functions", "cryptography hash function", "cartographic hash function"
"cryptographic hash function" » "cryptographic hash functions", "cryptography hash function", "cartographic hash function"
1
by Jamil, Norziana
Published 2013
“... used by these cryptographic hash functions, linear message expansion and poor difusion in the step...”Published 2013
View full text
Thesis
2
by Jamil, Norziana
Published 2013
“... used by these cryptographic hash functions, linear message expansion and poor difusion in the step...”Published 2013
View full text
Thesis
3
4
Published 2010
Table of Contents:
“...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...”View full text
Electronic
eBook
5
Published 2008
Table of Contents:
“... Attack -- Cryptographic Hash Functions I -- Hash Functions from Sigma Protocols and Improvements to VSH...”View full text
Electronic
eBook
6
Published 2010
Table of Contents:
“... -- Elliptic Curve Cryptography -- Cryptographic Hash Functions -- Block Cipher Cryptanalysis -- Chaos-Based...”View full text
Electronic
eBook
7
Published 2010
Table of Contents:
“...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... Cryptographic Hash Function -- Security Analysis of a 2/3-Rate Double Length Compression Function in the Black...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... Based Cryptographic Hash Functions -- Cryptographic Protocols -- Optimization of Electronic First-Bid...”View full text
Electronic
eBook
10
by Aumasson, Jean-Philippe., Aumasson, Jean-Philippe., Meier, Willi., Phan, Raphael C.-W., Henzen, Luca.
Published 2014
View full textPublished 2014
Electronic
eBook
11
Published 2010
Table of Contents:
“... -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“... Collisions, or Why CRHF Combiners Have a Long Output -- Constructing Cryptographic Hash Functions from Fixed...”View full text
Electronic
eBook
13
Published 2007
Table of Contents:
“... Databases from Cryptographic Hash Functions....”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function...”View full text
Electronic
eBook
15
Published 2008
Table of Contents:
“... -- New Results on the Key Scheduling Algorithm of RC4 -- Cryptographic Hash Functions -- Two Attacks...”View full text
Electronic
eBook
16
Published 2014
Table of Contents:
“... -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects...”View full text
Electronic
eBook
17
Published 2010
Table of Contents:
“... Midnight Wish Cryptographic Hash Function -- Optimization of Adaptive Petri-Net Grid Genetic Algorithm...”View full text
Electronic
eBook
18
19
20