Views
5 years ago

Dynamic Cryptographic Hash Functions - Cerias - Purdue University

Dynamic Cryptographic Hash Functions - Cerias - Purdue University

Dynamic Cryptographic Hash Functions - Cerias - Purdue

CERIAS Tech Report 2007-20 DYNAMIC CRYPTOGRAPHIC HASH FUNCTIONS by William Speirs Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086

Generating random numbers and computing cryptographic hashes ...
Attacks on Hash Functions and Applications, Marc Stevens, PhD thesis
Combining properties of cryptographic hash functions⋆ - Cryptology ...
natural language - Cerias - Purdue University
Cryptographic Hash functions - Department of Computer Science ...
Cryptographic properties of hash functions
Cryptographic properties of hash functions
Cryptographic Hash Function - Internet2 Middleware Initiative
A Survey on Recent Cryptographic Hash Function Designs
Cube Attacks on Cryptographic Hash Functions Joel Lathrop
Anti-Disassembly using Cryptographic Hash Functions About the ...
Hash functions - Secure Application Development
The cryptographic hash function SHA-256
IN COMMUNITY WE TRUST - Cerias - Purdue University
From Paper Clips to Software - Cerias - Purdue University
A Failure-Friendly Design Principle for Hash Functions
Rice - Secure Outsourcing - Cerias - Purdue University
properties and approach of cryptographic hash algorithms
the cryptographic hash algorithm family - NIST Information ...
Security Proofs for the MD6 Hash Function Mode - MIT Computer ...
How (not) to efficiently dither blockcipher-based hash functions?