Search alternatives:
"cryptographic hash function" » "cryptographic hash functions", "cryptography hash function"

1
by Megías, David
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...cryptographic hash function...

2
Published 2011
Chapman and Hall/CRC
Table of Contents: ...; Receipt; Secret Sharing Based on Discrete Logarithm Problems; Further Reading Cryptographic Hash Functions...

3
by Shankar, K., Elhoseny, Mohamed
Published 2019
Springer International Publishing
Table of Contents: ... Transmission in Wireless Sensor Networks -- An Optimal Lightweight Cryptographic Hash Function for Secure Image...

4
by Khlebnikov, Alexei
Published 2022
Packt Publishing, Limited
Table of Contents: ... and cryptocurrencies -- Proof-of-work -- Assessing the security of cryptographic hash functions -- Overview...

5
by Buchmann, Johannes
Published 2004
Springer New York
Table of Contents: ... Discrete Logarithms -- 11 Cryptographic Hash Functions -- 12 Digital Signatures -- 13 Other Systems -- 14...

6
Published 2023
Springer Nature Switzerland
Table of Contents: ... -- Implementation Aspects of Supersingular Isogeny-Based Cryptographic Hash Function -- Trust-based Communities...

7
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Secure against Related-Key Attacks -- Cryptographic Hash-Function Basics: Definitions, Implications...

8
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory...

9
by Garewal, Karan Singh
Published 2020
Apress
Table of Contents: ... Generators -- Conclusion -- References -- Chapter 4: Cryptographic Hash Functions -- An Introduction...

10
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Proofs -- Cryptographic Hash Functions II -- Preimage Attacks on 3, 4, and 5-Pass HAVAL -- How to Fill Up...

11
Published 2020
Springer International Publishing
Table of Contents: ...'s CAVP Testing of Cryptographic Hash Function Implementations -- A Fast Characterization Method for Semi...

12
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Cryptographic Hash Function --...

13
by Garewal, Karan Singh
Published 2020
Apress
Table of Contents: ...: Symmetric Encryption -- Chapter 4: Cryptographic Hash Functions -- Chapter 5: The Alchemy of Public Key...

14
by Antonopoulos, Andreas M., Wood, Gavin
Published 2018
O'Reilly Media, Inc.
Table of Contents: ...; Elliptic Curve Libraries; Cryptographic Hash Functions; Ethereum's Cryptographic Hash Function: Keccak-256...

15
by Barski, Conrad, Wilmer, Chris
Published 2015
No Starch Press
Table of Contents: ...Cryptographic Hash Functions Verify InformationPublic Key Cryptography; Digital Signatures; Using...

16
by Rosenbaum, Kalle
Published 2019
Manning Publications
Table of Contents: ... cryptocurrencies -- 2. Cryptographic hash functions and digital signatures -- The cookie token spreadsheet...

17
by Aumasson, Jean-Philippe, Meier, Willi, Phan, Raphael C.-W., Henzen, Luca
Published 2014
Springer Berlin Heidelberg

18
Published 2023
Springer Nature Switzerland
Table of Contents: ... Composition: the modes A10, A11 and A12 are insecure -- Exploring Formal Methods for Cryptographic Hash...

19
Published 2024
Springer International Publishing
Table of Contents: ... Differential Attacks and Application to WARP -- 7 Isogeny-based Cryptography II -- Faster Cryptographic Hash...

20
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Elliptic Curve Cryptography -- Cryptographic Hash Functions -- Block Cipher Cryptanalysis -- Chaos-Based...