DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Very smooth hash
Very smooth hash
(1) Hash Functions (2) MAC MDC OWHF CRHF UOWHF
Security of VSH in the Real World
The First Cryptographic Hash Workshop
Implementaç˜Ao Em Software De Algoritmos De Resumo Criptográfico
Design and Analysis of Hash Functions What Is a Hash Function?
Cryptographic Hash Functions in Groups and Provable Properties
Hash Functions Part II
Hash Functions with Proofs of Security for H : {0, 1}∗ →{0, 1}N and H : {0, 1}M →{0, 1}N, M > N
VSH, an Efficient and Provable Collision Resistant Hash Function
Hash Function Security : Cryptanalysis of the Very Smooth Hash
Divisibility, Smoothness and Cryptographic Applications
Design and Analysis of Hash Functions
Design and Analysis of Hash Functions
View the Index
Cryptanalysis of Dedicated Cryptographic Hash Functions
Filozofická Fakulta Univerzity Karlovy Ústav Informačních Studií A
Revisiting Dedicated and Block Cipher Based Hash Functions Anupam Pattanayak
Open Problems on Exponential and Character Sums
Top View
New Trends in the Design of Cryptographic Hash Functions
VSH, an Efficient and Provable Collision-Resistant Hash Function
Hash Functions — Much Ado About Something
On the Speed of VSH
On Graph-Based Cryptographic Hash Functions
Quantum Computing: a Taxonomy, Systematic Review and Future Directions
Faster Cryptographic Hash Function from Supersingular Isogeny Graphs
Cryptographic Hash Functions: Cryptanalysis, Design and Applications
Hash Functions Part II 2MMC10 Cryptology