Cryptographic hash function

Results: 1121



#Item
491PKCS / Abstract Syntax Notation One / Octet / Padding / RSA / Cryptographic hash function / Ip / Basic Encoding Rules / Cryptography / Cryptography standards / Public-key cryptography

Intel Security: Advanced Threat Research BERserk Vulnerability Part 1: RSA signature forgery attack due to incorrect parsing of ASN.1 encoded DigestInfo in PKCS#1 v1.5 September 29, 2014

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2014-09-30 12:40:24
492Error detection and correction / Computing / Computer programming / Search algorithms / Treap / Hash tree / Hash function / Binary search tree / Cryptographic hash function / Cryptography / Hashing / Binary trees

Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure Tobias Pulls Roel Peeters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 08:57:40
493Error detection and correction / Internet protocols / Secure communication / Hashing / Cryptographic protocols / HMAC / Transport Layer Security / SHA-2 / Cryptographic hash function / Cryptography / Cryptographic software / Computing

Microsoft Word - 1l - Accellion Security Policy_Acc_IGL_2014[removed]Accellion response.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:16:41
494Randomness / Block cipher / Pseudorandomness / National Institute of Standards and Technology / Federal Information Security Management Act / Cryptographic hash function / Random number generation / Cryptographically secure pseudorandom number generator / Dual EC DRBG / Cryptography / Pseudorandom number generators / Applied mathematics

The attached DRAFT document (SEPTEMBER 2013 draft version of: SP 800-90A Revisiion 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators) (is provided here for historical purposes) has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 17:22:13
495National Security Agency / Random number generation / Hardware random number generator / Pseudorandomness / Cryptographic hash function / FIPS 140-2 / Block cipher / Dual EC DRBG / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

DRAFT NIST Special Publication 800-90A, Rev. 1 Recommendation for Random Number Generation Using Deterministic Random Bit Generators

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-20 12:37:21
496Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cryptographic hash functions / Metrology / NIST hash function competition / Metre / Uncertainty / Text Retrieval Conference / Measurement / Science / Knowledge

Information Technology Laboratory Newsletter INSIDE THIS ISSUE November—December 2014

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-10-29 16:09:26
497Computing / Search algorithms / Data / Information / Database management systems / Hash function / Hash tree / Hash list / Trie / Error detection and correction / Cryptographic hash functions / Hashing

METHODOLOGY: TRUSTED ARCHIVE ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-11-25 15:11:47
498Museology / Error detection and correction / Archival science / Library science / Cryptographic hash function / Information science / Hash function / Digital preservation / Hashing / Cryptography / Data quality

ACE: a Novel Software Platform to Ensure the Long Term Integrity of Digital Archives Sangchul Song, Joseph JaJa; Institute for Advanced Computer Studies, Department of Electrical and Computer Engineering, University of M

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2008-09-10 16:10:09
499Cyberwarfare / Trusted Computing / Cryptographic protocol / Operating system / Cryptographic hash function / Cryptography / Security / Computer security

Formal Modeling and Verification of CloudProxy Wei Yang Tan1 , Rohit Sinha1 , John L. Manferdelli2 , and Sanjit A. Seshia1 1 2

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2014-08-07 18:17:41
500Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
UPDATE