Amanote Research

Amanote Research

    RegisterSign In

Parameterized Hash Functions

Annales UMCS, Informatica
doi 10.2478/v10065-012-0025-z
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2012

Authors
Tomasz BilskiKrzysztof BucholcAnna Grocholewska-CzuryloJanusz Stoklosa
Publisher

Uniwersytetu Marii Curie-Sklodowskiej w Lublinie


Related search

Cryptographic Hash Functions

2010English

On Hash Functions Using Checksums

International Journal of Information Security
Information SystemsRiskComputer NetworksCommunicationsReliabilitySafetyQualitySoftware
2009English

Square Hash: Fast Message Authentication via Optimized Universal Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

The State of Cryptographic Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

Cryptanalysis of Hash Functions With Structures

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Javascript Security Using Cryptographic Hash Functions

Advanced Information Systems
2019English

Tightly-Secure Signatures From Chameleon Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Hash Functions and Graphs With Large Girths

English

Cryptanalysis of the ESSENCE Family of Hash Functions

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy