×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [cryptographic hash functions]
TeraFire PB Book for Altera.pdf
39 views
XBoot Making a multi boot USB with Kon-Boot and OphCrack By David Lauer
256 views
AbstractAbstract 2006: The Burnt Pancake Problem Acknowledgements Acknowledgements Faculty and undergraduates at Missouri Western State University and
220 views
Hard and easy components of collision search in the Zémor- Tillich hash function: New attacks and reduced variants with equivalent security Christophe
218 views
Towards SHA-3 Christian Rechberger, KU Leuven. Fundamental questions in CS theory Do oneway functions exist? Do collision-intractable functions exist?
218 views
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs
217 views
LECTURE 4 Data Integrity & Authentication Message Authentication Codes (MACs)
254 views
CS 5950/6030 – Computer Security and Information Assurance Section 2: Introduction to Cryptology (Part 2) Dr. Leszek Lilien Department of Computer Science
225 views
4-2.1 Public Key Infrastructure (PKI) Slides for Grid Computing: Techniques and Applications by Barry Wilkinson, Chapman & Hall/CRC press, © 2009. Chapter
225 views
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
236 views
CS 5950/6030 Network Security Class 10 (F, 9/23/05) Leszek Lilien Department of Computer Science Western Michigan University [Using some slides courtesy
217 views
Chapter3 Public-Key Cryptography and Message Authentication
256 views
< Prev
Next >