搜索结果: 1-3 共查到“hash algorithms”相关记录3条 . 查询时间(0.141 秒)
The second round of the NIST public competition
is underway to find a new hash algorithm(s) for inclusion
in the NIST Secure Hash Standard (SHA-3). Computational
efficiency of the algorithms in har...
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
One-Way Hash Algorithm Replaceable One-Way Hash Algorithm One-Way Hash Family Long Term Security
2009/3/16
One-way hash algorithms are an indispensable
tool in data security. Over the last decade or
so a number of one-way hash algorithms have
been designed and many of them have been used
in numerous ap...
A FOUR-COMPONENT FRAMEWORK FOR DESIGNING AND ANALYZING CRYPTOGRAPHIC HASH ALGORITHMS
collisions compression functions hash algorithms HAVAL
2008/8/20
Cryptographic hash algorithms are important building blocks in cryptographic protocols,providing authentication and assurance of integrity. While many different hash algorithms are available including...