Cryptographic hash function

Results: 1121



#Item
591Cryptography / CBEFF / BioAPI / Basic Encoding Rules / Keystroke dynamics / XML / Abstract Syntax Notation One / Cryptographic hash function / Message authentication code / Security / Biometrics / Computing

XML Common Biometric Format

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2005-10-18 11:23:44
592Pseudorandom number generators / Cryptographic hash function / Hashing / RdRand / Entropy / Random number generation / NIST hash function competition / AES instruction set / Key management / Cryptography / Randomness / Information theory

Intel and Random Numbers David Johnston [removed] NIST Random Number Workshop Inconvenient Truths

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:42:38
593Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Cryptographic hash function / Extensible Storage Engine / Computer security / Trusted computing / Cryptography

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR[removed]September 11, 2006

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-09-12 07:35:22
594Fortuna / Entropy / Random number generation / Stream cipher / Cryptographic hash function / Hash function / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Pseudorandom number generators / Key generation

Cryptanalytic Attacks on Pseudorandom Number Generators John Kelsey ? David Wagner ???

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
595Cryptography / Metrology / Cryptographic hash function / 9H / National Institute of Metrology Standardization and Industrial Quality / Technology / Knowledge / Standards organizations / Science / Measurement

Microsoft Word - 17505_Programa del Seminario SIM - Buenos Aires.doc

Add to Reading List

Source URL: www.sim-metrologia.org.br

Language: English - Date: 2014-03-25 18:04:53
596Cyberwarfare / WS-Security / Cryptographic nonce / Password / Replay attack / Cryptographic hash function / Crypt / OASIS / Digest access authentication / Cryptography / Computing / Computer security

Microsoft Word - oasis[removed]wss-username-token-profile-1.0.doc

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-03-16 19:21:06
597Federal Depository Library Program / Digital libraries / Preservation / United States Government Printing Office / Authentication / Cryptographic hash function / Federal Digital System / Federal Register / Metadata / Cryptography / Notary / Electronic documents

Authenticity of Electronic Federal Government Publications __________________________________________________________________ U.S. Government Printing Office Washington, D.C[removed]

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-06-15 07:11:55
598NIST hash function competition / SHA-2 / Advanced Encryption Standard process / SHA-1 / Secure Hash Standard / Hash function / SANDstorm hash / Cryptographic hash functions / Error detection and correction / Cryptography

What hash functions were based on block ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:10:16
599Error detection and correction / Cryptography / Information retrieval / Computing / Hash function / Hash table / Associative array / Hash list / Comparison of programming languages / Hashing / Search algorithms / Cryptographic hash functions

Package ‘hash’ July 2, 2014 Type Package Title Full feature implementation of hash/associated arrays/dictionaries Version[removed]Date[removed]

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 12:06:36
600HMAC / Hashing / Advantage / Pseudorandom function family / Function / Information theory / Random oracle / Cryptography / Message authentication codes / Cryptographic hash functions

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria August[removed]Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-13 02:56:37
UPDATE