Cryptographic hash function

Results: 1121



#Item
481FIPS 140-2 / Cryptographic primitive / Cryptographic hash function / Block cipher / Protection Profile / FIPS 140 / Key size / SHA-2 / PKCS / Cryptography / Cryptography standards / Common Criteria

Ärendetyp: 6 SP-188 Diarienummer 13FMV128772:1 Dokument ID FMVID[removed]

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2013-06-25 04:56:56
482Cryptography / Information retrieval / Artificial intelligence / Applied mathematics / Block cipher / Universal hashing / Hash function / Hashing / Search algorithms / Cryptographic hash functions

Improving Upon the TET Mode of Operation Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T. Road, Kolkata India[removed].

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-14 08:08:11
483Common Criteria / Evaluation / Keystore / Protection Profile / Security Target / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Swedish Certification Body for IT Security Certification Report - Filkrypto 1.0 Issue: 1.0, 2007-Oct-05 Responsible: Anders Staaf

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2011-10-24 10:09:10
484Cyberwarfare / Security Target / Common Criteria / Protection Profile / Evaluation Assurance Level / Cryptographic hash function / PKCS / Evaluation / Computer security / Security

Security Target Filkrypto, Release[removed]Document Version: 1.3.1 Sponsor: Tutus Data AB Title

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2011-10-24 10:09:52
485Hashing / Search algorithms / Password / SHA-2 / Hash function / Crypt / Salt / PBKDF2 / Bcrypt / Cryptography / Cryptographic hash functions / Cryptographic software

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
486FIPS 140-2 / FIPS 140 / USB flash drive / Cryptographic Module Validation Program / HMAC / Kingston Technology / Password / Universal Serial Bus / Cryptographic hash function / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1g - Kingston DT4000 G2 FIPS[removed]Level 3 Security Policy v1.8.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:47:56
487Cryptographic hash functions / Computer programming / Information retrieval / Computational complexity theory / Universal hashing / Hash function / Lookup table / Hashing / Search algorithms / Computing

Low-Density Parity Constraints for Hashing-Based Discrete Integration

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2014-02-16 19:30:21
488Error detection and correction / SHA-1 / Hash list / Hash function / Crypt / Digital signature / SHA / Magnet URI scheme / File verification / Cryptography / Cryptographic hash functions / Hashing

LandXML LandXML – Signing & Sealing by Warren G. Clary, PE

Add to Reading List

Source URL: www.iheep2014.com

Language: English - Date: 2015-01-22 17:50:03
489Computing / Search algorithms / Information / Data / Hash tree / Hash function / Hash list / Trie / Database index / Error detection and correction / Hashing / Cryptographic hash functions

TRUSTED ARCHIVE OVERVIEW ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-12-23 13:21:52
490Block cipher / Cipher / Initialization vector / Feistel cipher / Cryptographic hash function / Key / Stream cipher / Public-key cryptography / Message authentication code / Cryptography / Key management / Symmetric-key algorithm

Chapter Cryptographic Tools and Techniques 1

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-12-25 07:16:38
UPDATE