User:Casial/Books/Cryptography propedeutics I

Hash Functions

 * Theory
 * Hash function
 * Cryptographic hash function
 * One-way function
 * One-way compression function
 * Pseudorandom function family
 * Pseudorandom permutation
 * Stream cipher
 * Cryptographically secure pseudorandom number generator
 * Message authentication
 * Merkle–Damgård construction
 * Salt (cryptography)
 * Key stretching
 * Avalanche effect
 * Comparison of cryptographic hash functions
 * Hash function security summary


 * Past
 * HAVAL
 * MD2 (cryptography)
 * MD4
 * MD5
 * SHA-1


 * Present
 * SHA-2
 * Whirlpool (cryptography)
 * RIPEMD
 * GOST (hash function)
 * BLAKE (hash function)
 * Tiger (cryptography)
 * SWIFFT
 * SipHash
 * Snefru


 * Near Future
 * SHA-3
 * Streebog


 * Attacks
 * Brute-force attack
 * Rainbow table
 * Collision (computer science)
 * Collision attack
 * Preimage attack
 * Birthday attack
 * Side-channel attack
 * Length extension attack