First Page | Document Content | |
---|---|---|
![]() Date: 2014-08-22 14:11:37Keccak NIST hash function competition SHA-2 Preimage attack Merkle–Damgård construction Crypt Hash tree SHA-1 Secure Hash Standard Cryptographic hash functions Error detection and correction Cryptography | Add to Reading List |
![]() | Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash StandardDocID: 1xVjQ - View Document |
![]() | GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface withDocID: 1rud6 - View Document |
![]() | Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00DocID: 1oV1V - View Document |
![]() | SHA-3 Standard: Permutation-Based Hash and Extendable-Output FunctionsDocID: 1lKRk - View Document |
![]() | FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITYDocID: 1lHQo - View Document |