DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» List of hash functions
List of hash functions
TS 102 176-1 V2.1.1 (2011-07) Technical Specification
The Hitchhiker's Guide to the SHA-3 Competition
Cryptography Knowledge Area (Draft for Comment)
NISTIR 7620 Status Report on the First Round of the SHA-3
Year 2010 Issues on Cryptographic Algorithms
Electronic Signature Algorithms Standard
A Hybrid Proof-Of-Work, Proof-Of-Stake Crypto-Currency
Automated Techniques for Hash Function and Block Cipher Cryptanalysis
Fundamental Data Structures Contents
Hash Function Design Overview of the Basic Components in SHA-3 Competition
Cryptography in Context
Use Style: Paper Title
The Hitchhiker's Guide to the SHA-3 Competition
S-FSB: an Improved Variant of the FSB Hash Family
Ts 119 312 V1.2.2 (2018-09)
Etsi Ts 119 312 V1.1.1 (2014-11)
Classification of the SHA-3 Candidates
Chapter 1 Network Security Overview
Top View
Analysis of Stream Cipher Based Authenticated Encryption Schemes
Cube Attacks on Cryptographic Hash Functions Joel Lathrop
Using Bloom Filters to Ensure Access Control and Authentication Requirements for Scada Field Devices
Rmlint Documentation Release
Chapter 1 Introduction to Cryptography
Nasha Cryptographic Hash Function
Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D
Fundamental Data Structures
ETSI TS 102 176-1 V1.2.1 (2005-07) Technical Specification
Cryptobiometrics for the Generation of Cancellable Symmetric and Asymmetric Ciphers with Perfect Secrecy
Distributed Symmetric-Key Encryption∗
Quantum Safe Cryptography and Security an Introduction, Benefits, Enablers and Challenges
Classification of the SHA-3 Candidates
Design Space Exploration for Ultra-Low Energy and Secure Iot Mcus
ETSI TS 102 176-1 V2.0.0 (2007-11) Technical Specification