DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» RIPEMD
RIPEMD
FIPS 140-2 Non-Proprietary Security Policy
Fast Hashing and Stream Encryption with Panama
Cryptanalysis of MD4
Efficient Collision Attack Frameworks for RIPEMD-160
Cryptography and Network Security Chapter 12
SHA-3 Conference, March 2012, Efficient Hardware Implementations
Constructing Secure Hash Functions by Enhancing Merkle-Damgård
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Primus HSM E-Series
Research Intuitions of Hashing Crypto System
RIPEMD-160: a Strengthened Version of RIPEMD
Message Authentication Codes
Design of SHA-3 Algorithm Using Compression Box (3200 Bit) for Digital Signature Applications
Performance of Message Authentication Codes for Secure Ethernet
How to Break MD5 and Other Hash Functions
Integrated-Key Cryptographic Hash Functions
Hash-Functions from Block Ciphers
Radiogat´ Un, a Belt-And-Mill Hash Function
Top View
Wolfssl+NTRU – High-Performance SSL Very Fast, Very Small SSL Ideal for Embedded and RTOS; Openssl-Compatible
Design and Analysis of Hash Functions
SHA-3: Where We've Been, Where We're Going
Tools in Cryptanalysis of Hash Functions Application to SHA-256
A Unified Architecture of MD5 and RIPEMD-160 Hash Algorithms
Fast Hashing and Stream Encryption with Panama
Comparison of Hash Function Algorithms Against Attacks: a Review
Cryptanalysis of 48-Step RIPEMD-160
Hashes for the Masses
The MD2 Hash Function Is Not One-Way
Authentication with RIPEMD-160 and Other Alternatives: a Hardware Design Perspective 103
CNS Lecture 3 - 2
The Design Principle of Hash Function with Merkle-Damgård Construction
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
Cryptographic Hash Functions
Symmetric Key – English (Open Source)
Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
Cryptanalysis of the Hash Functions MD4 and RIPEMD
Internationally Standardized Efficient Cryptographic Hash Function
Cryptographic Hash Functions
Crypto Copyright © 1999-2018 Ericsson AB
Open Source Internet Security
Cryptanalysis of MD4
LNCS 3329, Pp
SHA-3 and the Hash Function Keccak
Guidelines on Cryptographic Algorithms Usage and Key Management
ETSI TS 101 861 V1.1.1 (2001-08) Technical Specification
Ccsds Cryptographic Algorithms
Improved Cryptanalysis of Reduced RIPEMD-160
The Boomerang Attacks on BLAKE and BLAKE2
Cryptanalysis of Full RIPEMD-128
Cryptographic Hash Functions: Theory and Practice
Evaluation of Some Blockcipher Modes of Operation
Analysis of BLAKE2
Hardware Design for Hash Functions
Hash Functions and Message Authentication Codes
Comptia Security+ SY0-501
Constructions and Attacks on Hash Functions
Results for MD2, MD4
Use Style: Paper Title
FIPS 140-2 Non-Proprietary Security Policy
Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
Differential Attacks on Reduced RIPEMD-160
Network Security Chapter 5 Modification Check Values
Security Policy Ntoken