Cryptographic hash function

Results: 1121



#Item
501Email authentication / Internet privacy / Key management / Kerberos / Message authentication code / Password / S/MIME / Digital signature / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Young, A., Kirstein, P. and Ibbetson, A[removed]Technologies to Support Authentication in Higher Education : A Study for the UK Joint Information Systems Committee, August 21th, 1996. Other. UKOLN, University of Bath, Ba

Add to Reading List

Source URL: opus.bath.ac.uk

Language: English - Date: 2014-12-16 19:39:40
502Cryptographic software / Internet protocols / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / Cryptographic hash function / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Cryptography standards / Hashing

Microsoft Word - 2c - Globo Server FIPS 140 Security Policy v1-1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-18 11:21:10
503HMAC / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Cryptographic hash function / PKCS / Transport Layer Security / Digital Signature Algorithm / Network Security Services / Cryptography / Cryptography standards / FIPS 140

Microsoft Word - 1a - HealthStackIO FIPS 140 Security Policy v1-0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-25 18:22:54
504Cryptographic software / Internet protocols / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / Cryptographic hash function / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1c - Globo Mobile FIPS 140 Security Policy v1-1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-18 11:12:12
505Cryptographic protocols / Message authentication codes / Hashing / Internet protocols / HMAC / SHA-2 / Cryptographic hash function / Authentication / Label Distribution Protocol / Cryptography / Computing / Network architecture

Internet Engineering Task Force (IETF) Request for Comments: 7349 Category: Standards Track ISSN: [removed]L. Zheng

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-08-14 14:33:49
506Cryptographic hash functions / Computing / Information retrieval / Artificial intelligence / Hash function / Hash list / Hash / Associative array / Error detection and correction / Hashing / Search algorithms

Identity%20Resolution%20and%20Query%20Execution%20Process%20Overview.pdf

Add to Reading List

Source URL: www.doe.virginia.gov

Language: English - Date: 2012-11-09 14:29:17
507Hashing / Artificial intelligence / Error detection and correction / Cryptographic hash functions / Dimension reduction / Locality-sensitive hashing / Hash table / Hash function / Nearest neighbor search / Search algorithms / Information science / Information retrieval

Streaming Similarity Search over one Billion Tweets using Parallel Locality-Sensitive Hashing Narayanan Sundaram† , Aizana Turmukhametova ? , Nadathur Satish† , Todd Mostak? , Piotr Indyk? , Samuel Madden? and Pradee

Add to Reading List

Source URL: istc-bigdata.org

Language: English - Date: 2013-09-16 09:08:58
508Distributed revision control systems / Cryptographic hash functions / Git / Repo / Error detection and correction / Binary large object / SHA-1 / Distributed revision control / Hash function / Computer programming / Software / Computing

August 22, 2014 New Views on your History with git replace Christian Couder [removed]

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-08-17 17:20:21
509Hashing / Search algorithms / Random oracle / Preimage attack / Hash function / Collision resistance / SHA-1 / Oracle machine / Collision / Cryptography / Cryptographic hash functions / Error detection and correction

Microsoft Word - Scott Contini.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:08:36
510Search algorithms / Error detection and correction / Hash function / Random oracle / Oracle machine / Preimage attack / Elliptic curve only hash / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:10:52
UPDATE