„Hash Functions“
Suchergebnisse
222 Treffer
-
Skyscraper: Fast Hashing on Big Primes
-
Theory of cryptography – proceedings
-
Cryptography Made Simple
-
Progress in Cryptology -- LATINCRYPT 2015 – 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings
-
Information Security and Privacy – 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
-
Information Security and Cryptology -- ICISC 2013 – 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
-
Cryptology and Network Security – 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
-
Provable Security – 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
-
Fast software encryption – 20th international workshop ; revised selected papers
-
Applied Cryptography and Network Security – 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
-
Topics in Cryptology – CT-RSA 2014 – The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings
-
Theory of cryptography – proceedings
-
CryptoSchool
-
New Second-Preimage Attacks on Hash Functions
-
Understanding Cryptography – A Textbook for Students and Practitioners
-
Compositions of linear functions and applications to hashing
-
The Latin squares and the secret sharing schemes
-
A class of hash functions based on the algebraic eraser™
-
Two-party key establishment: From passive to active security without introducing new assumptions
-
Lightweight AEAD and hashing using the sparkle permutation family