Showing 1 - 20 results of 27 for search '"cryptographic hash function"', query time: 0.16s Refine Results
  1. 1
    Published 1999
    Table of Contents: “… -- The State of Cryptographic Hash Functions -- The Search for the Holy Grail in Quantum Cryptography…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 2
    Table of Contents: “… Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 3
    “… of the cases is provided through a cryptographic hash function. As happens for the majority of security…”
    Get full text
    Thesis
  4. 4
    Published 2004
    Table of Contents: “… Secure against Related-Key Attacks -- Cryptographic Hash-Function Basics: Definitions, Implications…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 5
    Published 2008
    Table of Contents: “… Attack -- Cryptographic Hash Functions I -- Hash Functions from Sigma Protocols and Improvements to VSH…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 6
    Published 2010
    Table of Contents: “…Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    Published 2005
    Table of Contents: “… Cryptographic Hash Function -- Security Analysis of a 2/3-Rate Double Length Compression Function in the Black…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 8
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2010
    Table of Contents: “… -- Elliptic Curve Cryptography -- Cryptographic Hash Functions -- Block Cipher Cryptanalysis -- Chaos-Based…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 10
  11. 11
    Published 2010
    Table of Contents: “…Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 12
    Published 2005
    Table of Contents: “… Based Cryptographic Hash Functions -- Cryptographic Protocols -- Optimization of Electronic First-Bid…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 13
    Published 2010
    Table of Contents: “… -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 14
    Published 2016
    Table of Contents: “… Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 15
    Published 2007
    Table of Contents: “… Databases from Cryptographic Hash Functions.…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 16
    Published 2008
    Table of Contents: “… Collisions, or Why CRHF Combiners Have a Long Output -- Constructing Cryptographic Hash Functions from Fixed…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 17
    Published 2001
    Table of Contents: “… with High Enciphering Rate -- A Parallel Algorithm for Extending Cryptographic Hash Functions -- Incremental…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 18
    Published 2014
    Table of Contents: “… -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 19
    Published 2010
    Table of Contents: “… Midnight Wish Cryptographic Hash Function -- Optimization of Adaptive Petri-Net Grid Genetic Algorithm…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 20
    Published 2008
    Table of Contents: “… -- New Results on the Key Scheduling Algorithm of RC4 -- Cryptographic Hash Functions -- Two Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search