-
1Published 1999Table of Contents: “… -- The State of Cryptographic Hash Functions -- The Search for the Holy Grail in Quantum Cryptography…”
Full Text via HEAL-Link
Electronic eBook -
2Table of Contents: “… Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image…”
Full Text via HEAL-Link
Electronic eBook -
3by Αθανασίου, Γεώργιος“… of the cases is provided through a cryptographic hash function. As happens for the majority of security…”
Published 2014
Get full text
Thesis -
4Published 2004Table of Contents: “… Secure against Related-Key Attacks -- Cryptographic Hash-Function Basics: Definitions, Implications…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2008Table of Contents: “… Attack -- Cryptographic Hash Functions I -- Hash Functions from Sigma Protocols and Improvements to VSH…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2010Table of Contents: “…Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2005Table of Contents: “… Cryptographic Hash Function -- Security Analysis of a 2/3-Rate Double Length Compression Function in the Black…”
Full Text via HEAL-Link
Electronic eBook -
8
-
9Published 2010Table of Contents: “… -- Elliptic Curve Cryptography -- Cryptographic Hash Functions -- Block Cipher Cryptanalysis -- Chaos-Based…”
Full Text via HEAL-Link
Electronic eBook -
10
-
11Published 2010Table of Contents: “…Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition…”
Full Text via HEAL-Link
Electronic eBook -
12Published 2005Table of Contents: “… Based Cryptographic Hash Functions -- Cryptographic Protocols -- Optimization of Electronic First-Bid…”
Full Text via HEAL-Link
Electronic eBook -
13Published 2010Table of Contents: “… -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2016Table of Contents: “… Attack on Full GOST -- Cryptographic Hash Functions and Expander Graphs: The End of the Story? -- Side…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2007Table of Contents: “… Databases from Cryptographic Hash Functions.…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2008Table of Contents: “… Collisions, or Why CRHF Combiners Have a Long Output -- Constructing Cryptographic Hash Functions from Fixed…”
Full Text via HEAL-Link
Electronic eBook -
17Published 2001Table of Contents: “… with High Enciphering Rate -- A Parallel Algorithm for Extending Cryptographic Hash Functions -- Incremental…”
Full Text via HEAL-Link
Electronic eBook -
18Published 2014Table of Contents: “… -- Exploring Chaotic Neural Network for Cryptographic Hash Function -- Protocol to Authenticate the Objects…”
Full Text via HEAL-Link
Electronic eBook -
19Published 2010Table of Contents: “… Midnight Wish Cryptographic Hash Function -- Optimization of Adaptive Petri-Net Grid Genetic Algorithm…”
Full Text via HEAL-Link
Electronic eBook -
20Published 2008Table of Contents: “… -- New Results on the Key Scheduling Algorithm of RC4 -- Cryptographic Hash Functions -- Two Attacks…”
Full Text via HEAL-Link
Electronic eBook