Results 161 to 170 of about 36,351 (194)

EUPID-configurable privacy-preserving record linkage in federated health data spaces. [PDF]

open access: yesFront Digit Health
Hayn D   +10 more
europepmc   +1 more source

Cryptographic Hash Functions from Expander Graphs

Journal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Charles, Denis X.   +2 more
openaire   +4 more sources

The NIST Cryptographic Workshop on Hash Functions

IEEE Security & Privacy Magazine, 2006
In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to solicit input on the current status of the Secure Hash Algorithm-1 (SHA-1) family of hash functions.
C. Rechberger, V. Rijmen, N. Sklavos
openaire   +3 more sources

Requirements for cryptographic hash functions

Computers & Security, 1992
We give a comprehensive discussion of and structure for the quality requirements good cryptographic hash functions should fulfil. Functional requirements like contraction of the input and fast calculation are ordered by priority in the algorithm design and implementation process.
Fritz Bauspiess, Frank Damm
openaire   +1 more source

Cryptographic Hash Function

2015
Cryptographic hash function verifies data integrity and sender identity or source of information. The task is accomplished by taking a variable bit patterns as an input then produces a fixed bit patterns of output. This chapter provides a detailed overview to include classification, properties, constructions, attacks, applications and an overview of a ...
Imad Fakhri Alshaikhli   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy