Difference between revisions of "The eHash Main Page"
From The ECRYPT Hash Function Website
Line 7: | Line 7: | ||
== Notation and Definition == | == Notation and Definition == | ||
− | + | == Generic Attacks on Hash Functions == | |
== Some How Tos == | == Some How Tos == |
Revision as of 08:59, 11 October 2006
Contents
1 List of Hash Functions
On this page you can find a collection of existing hash functions.
Collection of Cryptographic Hash Functions
2 Notation and Definition
3 Generic Attacks on Hash Functions
4 Some How Tos
<math> {\textbf x}_{t} = {\textbf f}({x}_{t-1},{u}_{t-1},{p}_{t-1}) </math>
5 Getting started
ECRYPT is a Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at his or her sole risk and liability.