DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Tiger (hash function)

Tiger (hash function)

  • Nshield CONNECT Hsms

    Nshield CONNECT Hsms

  • Security Policy: Informacast Java Crypto Library

    Security Policy: Informacast Java Crypto Library

  • Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

  • Advanced Meet-In-The-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2

    Advanced Meet-In-The-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2

  • Cryptographic Hash Workshop (2005)

    Cryptographic Hash Workshop (2005)

  • Tiger Hash Attribute Encryption for Secured Cloud Service Provisioning

    Tiger Hash Attribute Encryption for Secured Cloud Service Provisioning

  • Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

    Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

  • Attacks on and Advances in Secure Hash Algorithms

    Attacks on and Advances in Secure Hash Algorithms

  • Security Policy: HID Global Cryptographic Module

    Security Policy: HID Global Cryptographic Module

  • Side Channel Analyses of CBC Mode Encryption

    Side Channel Analyses of CBC Mode Encryption

  • Preimage Attacks on Reduced Tiger and SHA-2

    Preimage Attacks on Reduced Tiger and SHA-2

  • Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

  • Nshield Solo Hsms Certified PCI-Express Cards That Deliver Cryptographic Key Services to Stand-Alone Servers

    Nshield Solo Hsms Certified PCI-Express Cards That Deliver Cryptographic Key Services to Stand-Alone Servers

  • Hash-Functions from Block Ciphers

    Hash-Functions from Block Ciphers

  • Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

  • 8 Rounds Fm,0 0

    8 Rounds Fm,0 0

  • Analysis and Design of Blockcipher Based Cryptographic Algorithms

    Analysis and Design of Blockcipher Based Cryptographic Algorithms

  • Hash Algorithms for 8051-Based Sensornodes

    Hash Algorithms for 8051-Based Sensornodes

Top View
  • Algorithms, Key Size and Parameters Report – 2014
  • Fast Message Franking: from Invisible Salamanders to Encryptment
  • Rebound Distinguishers: Results on the Full Whirlpool Compression Function
  • A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
  • Theoretical Survey on Secure Hash Functions and Issues
  • A Comparative Study of Rivest Cipher Algorithms
  • Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
  • Encryption Test Suite User Guide
  • Intel® Converged Security and Management Engine (Intel® CSME)
  • New Pseudo Near Collision Attack on Tiger
  • Cryptographic Hash Functions
  • CSE331 : Computer Security Fundamentals Part I : Crypto (3)
  • Advanced Crypto
  • Energy Consumption of Hash Functions
  • Cryptographic Hash Functions
  • Entrust Nshield Hsmi
  • ENTRUST® Nshield ISSUANCE HARDWARE SECURITY MODULE
  • ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)


© 2024 Docslib.org    Feedback