Security proofs for the MD6 hash function mode of operation
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008. === Includes bibliographical references (p. 79-82). === In recent years there have been a series of serious and alarming cryptanalytic attacks on several commonly-used hash functions, su...
Main Author: | Crutchfield, Christopher Yale |
---|---|
Other Authors: | Ronald L. Rivest. |
Format: | Others |
Language: | English |
Published: |
Massachusetts Institute of Technology
2009
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/44425 |
Similar Items
-
Design and applications of a secure and decentralized Distributed Hash Table
by: Lesniewski-Laas, Christopher T. (Christopher Tur), 1980-
Published: (2011) -
Relationships between functionality, security, and privacy for multiparty computation, hashing, and encryption
by: LaVigne, Rio(Kristen Rio)
Published: (2020) -
A distributed Hash table
by: Dabek, Frank (Frank Edward), 1977-
Published: (2008) -
Beyond locality-sensitive hashing
by: Razenshteyn, Ilya
Published: (2014) -
Distributed web caching system with consistent hashing
by: Sherman, Alexander,1975-
Published: (2013)