DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Collision resistance
Collision resistance
Hash Functions and Thetitle NIST of Shapresentation-3 Competition
Hash Functions
The First Cryptographic Hash Workshop
Constructing Secure Hash Functions by Enhancing Merkle-Damgård
Hash Functions
Design and Analysis of Hash Functions What Is a Hash Function?
Cryptographic Hash Functions
Are Certificate Thumbprints Unique?
Security This PDF Document Is an Inferior Version of an OER HTML Page
International Journal of Engineering Sciences
Symmetric Cryptography
VSH, an Efficient and Provable Collision Resistant Hash Function
CRYPTREC Review of Eddsa CRYPTREC EX-3003-2020
Hash Function Security : Cryptanalysis of the Very Smooth Hash
Open Sesame the Password Hashing Competition and Argon2 Jos Wetzels
SHA-1 Is a Shambles∗ First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
Draft FIPS 186-5, Digital Signature Standard (DSS)
Hash Functions
Top View
Cryptanalysis of Dedicated Cryptographic Hash Functions
Collision Resistance – Hard to find X ≠ X’ S.T
Security II: Cryptography
The Design Principle of Hash Function with Merkle-Damgård Construction
Introduction to Cryptography
Hash Functions - Bart Preneel June 2016
Multi-Collision Resistance: a Paradigm for Keyless Hash Functions
NIST Special Publication 800-107 Revision 1, Recommendation For
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A Meaningful MD5 Hash Collision Attack
Tradeoff Tables for Compression Functions: How to Invert Hash Values
Integrity and Hash Functions
Non-Interactive Half-Aggregation of Eddsa and Variants of Schnorr Signatures
Post-Quantum Hash-Based Signatures for Multi-Chain Blockchain Technologies
VSH, an Efficient and Provable Collision-Resistant Hash Function
Classification of Hash Functions Suitable for Real-Life Systems 65
Hash Functions Integrity Checks
An In-Depth Look Into Cryptographic Hashing Algorithms
On Graph-Based Cryptographic Hash Functions
Data Security
Hash Functions and Message Authentication Codes
Cryptographic Hash Functions
SHA-1 Is a Shambles First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
Lecture 5 Supplement
Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Some Thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1 ⋆
CO ˚˜fl¨ˇ˚¯ P`E›N`G S˚I˜Bfle¨Lˇi˚U¯S } Preface
The Security of DSA and ECDSA Bypassing the Standard Elliptic Curve Certification Scheme
Graphical Passwords Challenge-Response Biometrics
Cryptographic Hash Functions
Security Issues in Cloud Computing Modern Cryptography I – Symmetric Cryptography (Ctd.)