all InfoSec news
Topic: hash function
Supersingular Hashing using Lattès Maps
2 weeks, 5 days ago |
www.iacr.org
Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations
1 month, 2 weeks ago |
arxiv.org
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
1 month, 3 weeks ago |
www.iacr.org
Automating Collision Attacks on RIPEMD-160
2 months ago |
www.iacr.org
Rate-1 Fully Local Somewhere Extractable Hashing from DDH
2 months, 1 week ago |
www.iacr.org
Lattice-based Programmable Hash Functions and Applications
4 months, 3 weeks ago |
www.iacr.org
Hashing User Passwords Using bcrypt in Python
5 months, 3 weeks ago |
dev.to
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
7 months, 2 weeks ago |
www.iacr.org
Hashing into quadratic residues modulo a safe prime composite
7 months, 3 weeks ago |
www.iacr.org
XHash8 and XHash12: Efficient STARK-friendly Hash Functions
9 months, 3 weeks ago |
www.iacr.org
Breaking Pedersen Hashes in Practice
1 year, 1 month ago |
research.nccgroup.com
A Generic Transform from Multi-Round Interactive Proof to NIZK
1 year, 1 month ago |
www.iacr.org
The Elliptic Curve Digital Signature Algorithm Flaw
1 year, 2 months ago |
systemweakness.com
A Detailed Analysis of Fiat-Shamir with Aborts
1 year, 2 months ago |
www.iacr.org
TLS Essentials 5: Integrity with cryptographic hash functions
1 year, 2 months ago |
www.youtube.com
The Tip5 Hash Function for Recursive STARKs
1 year, 2 months ago |
www.iacr.org
Differential analysis of the ternary hash function Troika
1 year, 3 months ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Supersingular Hashing using Lattès Maps
2 weeks, 5 days ago |
www.iacr.org
Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations
1 month, 2 weeks ago |
arxiv.org
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
1 month, 3 weeks ago |
www.iacr.org
Automating Collision Attacks on RIPEMD-160
2 months ago |
www.iacr.org
Rate-1 Fully Local Somewhere Extractable Hashing from DDH
2 months, 1 week ago |
www.iacr.org
Lattice-based Programmable Hash Functions and Applications
4 months, 3 weeks ago |
www.iacr.org
Hashing User Passwords Using bcrypt in Python
5 months, 3 weeks ago |
dev.to
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
7 months, 2 weeks ago |
www.iacr.org
Hashing into quadratic residues modulo a safe prime composite
7 months, 3 weeks ago |
www.iacr.org
XHash8 and XHash12: Efficient STARK-friendly Hash Functions
9 months, 3 weeks ago |
www.iacr.org
Breaking Pedersen Hashes in Practice
1 year, 1 month ago |
research.nccgroup.com
A Generic Transform from Multi-Round Interactive Proof to NIZK
1 year, 1 month ago |
www.iacr.org
The Elliptic Curve Digital Signature Algorithm Flaw
1 year, 2 months ago |
systemweakness.com
A Detailed Analysis of Fiat-Shamir with Aborts
1 year, 2 months ago |
www.iacr.org
TLS Essentials 5: Integrity with cryptographic hash functions
1 year, 2 months ago |
www.youtube.com
The Tip5 Hash Function for Recursive STARKs
1 year, 2 months ago |
www.iacr.org
Differential analysis of the ternary hash function Troika
1 year, 3 months ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Salesforce Solution Consultant
@ BeyondTrust | Remote United States
Divisional Deputy City Solicitor, Public Safety Compliance Counsel - Compliance and Legislation Unit
@ City of Philadelphia | Philadelphia, PA, United States
Security Engineer, IT IAM, EIS
@ Micron Technology | Hyderabad - Skyview, India
Security Analyst
@ Northwestern Memorial Healthcare | Chicago, IL, United States
Werkstudent Cybersecurity (m/w/d)
@ Brose Group | Bamberg, DE, 96052