Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks (2016) - Boneh, Corrigan-Gibbs, Schechter.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
cryptography & mathematics
/
hashes
/
Parent Folder
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks (2016) - Boneh, Corrigan-Gibbs, Schechter.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Blake2: Simpler, Smaller, Fast as MD5 (2013) - Aumasson, Neves, Wilcox-O'Hearn, Winnerlein.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptographic Sponge Functions v0.1 (2011) - Bertoni, Daemen, Peeters, van Assche.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Multicollisions in Iterated Hash Functions: Applications to Cascaded Constructions (2004) - Joux.pdf.gz
GZ
2 years ago
Get Size
Copy Link
New Proofs for NMAC and HMAC: Security without Collision-Resistance (2006) - Bellare.pdf.gz
GZ
2 years ago
Get Size
Copy Link
QUARK: A Lightweight Hash (2008) - Aumasson, Henzen, Meier, Naya-Plasencia.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Quantum Cryptanalysis of Hash and Claw-Free Functions (1997) - Brassard, HΓΈyer, Tapp.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Smooth Projective Hashing for Conditionally Extractable Commitments (2009) - Abdalla, Chevalier, Pointcheval.pdf.gz
GZ
2 years ago
Get Size
Copy Link
The STROBE Protocol Framework (2018) - Hamburg.pdf.gz
GZ
2 years ago
Get Size
Copy Link
CubeHash parameter tweak: 16 times faster (2013) - Bernstein.pdf.gz
GZ
2 years ago
Get Size
Copy Link
First Analysis of Keccak (2009) - Aumasson, Khovratovich.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Keccak Specifications (2008) - Bertoni, Daemen, Peeters, van Assche.pdf.gz
GZ
2 years ago
Get Size
Copy Link
The Keccak Reference v3.0 (2011) - Bertoni, Daemen, Peeters, van Assche.pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Study of the MD5 Attacks: Insights and Improvements (2006) - Black, Cochran, Highland.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Collisions for the compression function of MD5 (1993) - Boer, Bosselaers.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Construct MD5 Collisions Using Just A Single Block Of Message (2010) - Xie, Feng.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Fast Collision Attack on MD5 (2006) - Marc Stevens.pdf.gz
GZ
2 years ago
Get Size
Copy Link
On Collisions for MD5 [Thesis] (2007) - Stevens.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Single Block Collision Attacks on MD5 (2012) - Stevens.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Scrypt: Stronger Key Derivation Via Sequential Memory-Hard Functions (2009) - Percival.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.