DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Tiger (hash function)
Tiger (hash function)
Nshield CONNECT Hsms
Security Policy: Informacast Java Crypto Library
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
Advanced Meet-In-The-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Cryptographic Hash Workshop (2005)
Tiger Hash Attribute Encryption for Secured Cloud Service Provisioning
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Attacks on and Advances in Secure Hash Algorithms
Security Policy: HID Global Cryptographic Module
Side Channel Analyses of CBC Mode Encryption
Preimage Attacks on Reduced Tiger and SHA-2
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
Nshield Solo Hsms Certified PCI-Express Cards That Deliver Cryptographic Key Services to Stand-Alone Servers
Hash-Functions from Block Ciphers
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
8 Rounds Fm,0 0
Analysis and Design of Blockcipher Based Cryptographic Algorithms
Hash Algorithms for 8051-Based Sensornodes
Top View
Algorithms, Key Size and Parameters Report – 2014
Fast Message Franking: from Invisible Salamanders to Encryptment
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms
Theoretical Survey on Secure Hash Functions and Issues
A Comparative Study of Rivest Cipher Algorithms
Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
Encryption Test Suite User Guide
Intel® Converged Security and Management Engine (Intel® CSME)
New Pseudo Near Collision Attack on Tiger
Cryptographic Hash Functions
CSE331 : Computer Security Fundamentals Part I : Crypto (3)
Advanced Crypto
Energy Consumption of Hash Functions
Cryptographic Hash Functions
Entrust Nshield Hsmi
ENTRUST® Nshield ISSUANCE HARDWARE SECURITY MODULE
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
New Preimage Attacks Against Reduced SHA-1⋆
Cryptanalysis of the Tiger Hash Function⋆
MD5 to Be Considered Harmful (Someday)
The Libgcrypt Reference Manual Version 1.9.0 18 January 2021
Cryptanalysis of the Tiger Hash Function?
Nshield Connect Hsms Certified Appliances That Deliver Scalable and Highly Available Cryptographic Key Services Across Networks Nshield Connect Hsms Feature Overview
FIPS 140-2 Non-Proprietary Security Policy
Botan Reference Guide Release 2.18.1
Fast Message Franking: from Invisible Salamanders to Encryptment∗
Algorithms, Key Sizes and Parameters Report 2013 Recommendations Version 1.0 – October 2013
Tiger: a Fast New Hash Function
Security Policy Ntoken