Cryptographic hash function

Results: 1121



#Item
411NIST hash function competition / SHA-2 / Vlastimil Klíma / Hash function / Crypt / SHA-1 / Comparison of cryptographic hash functions / Cryptographic hash functions / Cryptography / Hashing

Microsoft PowerPoint - 1_BlueMidnightWish-Presentation-Final.ppt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-05 10:49:12
412Cyberwarfare / Cryptographic hash function / Ciphertext / Collision attack / Hash function / Collision resistance / Security / One-way compression function / Cryptography / Block cipher / Espionage

Microsoft PowerPoint - Klima_SPI

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2007-05-05 06:57:26
413Cryptographic software / Key / Cryptographic hash function / SHA-2 / Digital signature / Key generation / Network Security Services / Cryptography / Key management / Public-key cryptography

Digital Certificate From 1024 to 2048 Insert Your Kenny Lai Name

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-09 01:36:33
414Cryptanalysis / Cipher / Symmetric-key algorithm / Block cipher / SHA-1 / NIST hash function competition / Cryptosystem / Transport Layer Security / Lattice-based cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

IS2: Guidelines for Authors

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-06-09 08:32:09
415Hashing / SHA-2 / Hash function / HMAC / Endianness / Preimage attack / Padding / Collision attack / GOST / Error detection and correction / Cryptography / Cryptographic hash functions

Cryptographic Hash Function E DON - R Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2009-02-11 09:26:04
416Finite fields / Galois/Counter Mode / Key management / NSA Suite B Cryptography / Block cipher / Authenticated encryption / Cryptographic hash function / Advanced Encryption Standard / Initialization vector / Cryptography / Message authentication codes / Block cipher modes of operation

GCM, GHASH and Weak Keys Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2011-05-09 07:04:03
417RSA / Dining cryptographers problem / Cryptographic hash function / Hash function / XTR / Email / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 1998 Final Exam

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-03-13 15:29:31
418Symmetric-key algorithm / Public-key cryptography / Session key / Key / SHA-1 / Cryptographic hash function / Key size / Key generation / Cryptography / Key management / Cryptographic software

Microsoft PowerPoint - 11_magee [Read-Only]

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2013-07-27 23:40:23
419Cryptographic hash function / Digital signature / Hash function / XTR / Blind signature / Lamport signature / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2003 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-01-11 14:38:17
420Cryptographic hash function / RSA / SHA-1 / Digital signature / Message authentication code / Cryptography / Public-key cryptography / MD5

CS255: Cryptography and Computer Security Winter 2005 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-03-13 22:33:48
UPDATE