The eHash Main Page
Contents
1 List of Hash Functions
On this page you can find a collection of existing hash functions.
Collection of Cryptographic Hash Functions
2 Notation and Definition
3 Generic Attacks on Hash Functions
4 Some How Tos
<math> {\textbf x}_{t} = {\textbf f}({x}_{t-1},{u}_{t-1},{p}_{t-1}) </math>
if we want to use the amsmath package we have to usse the class WikiTeX: latex reported a failure, namely:
/data/www/ehash/html/extensions/wikitex/wikitex.sh: line 59: latex: command not found
. Automated numbering of equations works within a single amsmath environment but only if we do some dirty hacking ... (click on the equation to see why). If we start a new <masmath> environment then the equation numbering starts from counter=1 again. So in general, we should not expect that we can do whatever we want with the WikiTeX: latex reported a failure, namely:
/data/www/ehash/html/extensions/wikitex/wikitex.sh: line 59: latex: command not found
. WikiTeX: latex reported a failure, namely:
/data/www/ehash/html/extensions/wikitex/wikitex.sh: line 59: latex: command not found
start a new WikiTeX: latex reported a failure, namely:
/data/www/ehash/html/extensions/wikitex/wikitex.sh: line 59: latex: command not found
environment: WikiTeX: latex reported a failure, namely:
/data/www/ehash/html/extensions/wikitex/wikitex.sh: line 59: latex: command not found
as we see both envrionments start with 1.
5 Getting started
ECRYPT is a Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. The information on this web site is provided as is, and no guarantee or warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at his or her sole risk and liability.