×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [cryptographic hash functions]
Home >
cryptographic hash functions
CHENCHUAES
111 views
Computation, Quantum Theory, and You Scott Aaronson, UC Berkeley Qualifying Exam May 13, 2002.
221 views
Quantum Lower Bound for the Collision Problem Scott Aaronson 1/10/2002 quant-ph/0111102 I was born at the Big Bang. Cool! We have the same birthday.
213 views
The Future (and Past) of Quantum Lower Bounds by Polynomials Scott Aaronson UC Berkeley.
216 views
Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov Lintao Zhang Microsoft Research Silicon Valley Campus.
222 views
Copyright © 2002 Nominum, Inc.1 Information Document 17-E ITU-T Study Group 2 May 2002 QUESTION:Q.1/2 SOURCE:TSB TITLE:INTRODUCTION TO SECURE DNS (by Jim.
216 views
Securing Low-cost RFID Systems: an Unconditionally Secure ...
704 views
Plan9 from Bell Labs meets TinyCore Linux
1.796 views
Uncloaking IP Addresses on IRC
420 views
How to Use Cryptography Properly: The Common Mistakes People Make When Using Cryptographic Functions
56 views
Crypto basics
26 views
TeraFire PB Book for Altera.pdf
28 views
Next >