DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» SipHash
SipHash
PHC: Status Quo
SPHINCS: Practical Stateless Hash-Based Signatures
Forgery and Key Recovery Attacks for Calico
Differential Cryptanalysis of Siphash
Lightweight Macs from Universal Hash Functions
Hash Pile Ups: Using Collisions to Identify Unknown Hash Functions
Research Intuitions of Hashing Crypto System
Security Policy: Java Crypto Module
Two Provably Secure Password Hashing Algorithms
Analyse, Modellierung Und Hashcat-Basierte Implementierung Von Angriffen Auf Passwortgeschutzte¨ Systeme Unter Einbeziehung Des Faktors Mensch
Fast Keyed Hash/Pseudo-Random Function Using SIMD Multiply and Permute
CHAPTER 19 Android User Enabled Security: Passwords and Gesture
Performance of Message Authentication Codes for Secure Ethernet
Vmware's BC-FJA (Bouncy Castle FIPS Java API) Software Version: 1.0.2.1
Hashing Techniques: a Survey and Taxonomy
Security 101 Image Attribution: Randall Munroe ELCA For
Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA
Lightweight Macs from Universal Hash Functions Sébastien Duval, Gaëtan Leurent
Top View
Cryptographic Technology Guideline (Lightweight Cryptography)
Generic Universal Forgery Attack on Iterative Hash-Based Macs
A Survey of Lightweight Cryptographic Hash Function Baraa Tareq Hammad, Norziana Jamil, Mohd Ezanee Rusli and Muhammad Reza Z`Aba
CNIT 141 Cryptography for Computer Networks
Fast Reconfigurable Hash Functions for Network Flow Hashing in Fpgas
An Authentication Protocol Based on Chaos and Zero Knowledge Proof
Specification of Crypto Service Manager AUTOSAR CP Release 4.3.1
Differential Cryptanalysis of Siphash
Cryptanalysis of Reduced-Round Siphash
Haraka V2 – Efficient Short-Input Hashing for Post-Quantum Applications
Hash-Flooding Dos Reloaded: Attacks and Defenses
Chaskey: a Lightweight MAC Algorithm for Microcontrollers⋆
Design and Analysis of Cryptographic Algorithms
Key-Recovery Attacks Against the MAC Algorithm Chaskey⋆
Analysis and Design of Authentication and Encryption Algorithms for Secure Cloud Systems
Hashing for Message Authentication
Siphash: a Fast Short-Input PRF
Brains Over Brawn: Intelligent Password Recovery
Cryptographic Hashing in P4 Data Planes
ARX-KW, a Family of Key Wrapping Constructions Using Siphash and Chacha
Siphash: a Fast Short-Input PRF
Botan Reference Guide Release 2.18.1
Cuckoo Cycle: a Memory-Hard Proof-Of-Work System
A Study on the Security of Password Hashing Based on GPU Based, Password Cracking Using High-Performance Cloud Computing Parves Kamal
[email protected]
Siphash: a Fast Short-Input PRF