×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [cryptographic hash functions]
Documents
TeraFire PB Book for Altera.pdf
40 views
Documents
XBoot Making a multi boot USB with Kon-Boot and OphCrack By David Lauer
258 views
Documents
AbstractAbstract 2006: The Burnt Pancake Problem Acknowledgements Acknowledgements Faculty and undergraduates at Missouri Western State University and
223 views
Documents
Hard and easy components of collision search in the Zémor- Tillich hash function: New attacks and reduced variants with equivalent security Christophe
218 views
Documents
Towards SHA-3 Christian Rechberger, KU Leuven. Fundamental questions in CS theory Do oneway functions exist? Do collision-intractable functions exist?
220 views
Documents
CS426Fall 2010/Lecture 351 Computer Security CS 426 Lecture 35 Commitment & Zero Knowledge Proofs
217 views
Documents
LECTURE 4 Data Integrity & Authentication Message Authentication Codes (MACs)
254 views
Documents
CS 5950/6030 – Computer Security and Information Assurance Section 2: Introduction to Cryptology (Part 2) Dr. Leszek Lilien Department of Computer Science
225 views
Documents
4-2.1 Public Key Infrastructure (PKI) Slides for Grid Computing: Techniques and Applications by Barry Wilkinson, Chapman & Hall/CRC press, © 2009. Chapter
225 views
Documents
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
237 views
Documents
CS 5950/6030 Network Security Class 10 (F, 9/23/05) Leszek Lilien Department of Computer Science Western Michigan University [Using some slides courtesy
219 views
Documents
Chapter3 Public-Key Cryptography and Message Authentication
258 views
< Prev
Next >