[PDF][PDF] Cryptographic hash functions: a review
Cryptographic Hash Functions: A Review Page 1 Cryptographic Hash Functions: A Review Rajeev
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …
Forward and backward private searchable encryption from constrained cryptographic primitives
R Bost, B Minaud, O Ohrimenko - … of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can
securely outsource a database to an untrusted server, in such a way that the database can …
securely outsource a database to an untrusted server, in such a way that the database can …
[PDF][PDF] A graduate course in applied cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …
and recently gained in popularity due to novel proof systems. For many of these …
[图书][B] Understanding cryptography
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …
edition in 2009, we have been humbled by the many positive responses we received from …
[图书][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[图书][B] Introduction to modern cryptography: principles and protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
Merkle-Damgård revisited: How to construct a hash function
The most common way of constructing a hash function (eg, SHA-1) is to iterate a
compression function on the input message. The compression function is usually designed …
compression function on the input message. The compression function is usually designed …
RIPEMD-160: A strengthened version of RIPEMD
H Dobbertin, A Bosselaers, B Preneel - International Workshop on Fast …, 1996 - Springer
Cryptographic hash functions are an important tool in cryptography for applications such as
digital fingerprinting of messages, message authentication, and key derivation. During the …
digital fingerprinting of messages, message authentication, and key derivation. During the …
Black-box analysis of the block-cipher-based hash-function constructions from PGV
Abstract Preneel, Govaerts, and Vandewalle [6] considered the 64 most basic ways to
construct a hash function H:(0, 1)*→(0, 1) n from a block cipher E:(0, 1) n×(0, 10 n→(0, 1) n …
construct a hash function H:(0, 1)*→(0, 1) n from a block cipher E:(0, 1) n×(0, 10 n→(0, 1) n …