Cryptographic hash function

Results: 1121



#Item
641NIST hash function competition / Crypt / Information retrieval / Artificial intelligence / Computing / Cryptographic hash functions / Hash function / Block cipher

outbind://216-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A04

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:39:12
642Electronic voting / Information society / Validation / Software development process / FIPS 140-2 / Debian / Cryptographic hash function / Computing / Science / Software / Hashing

Draft Recommendations for Software Distribution and Setup Validation: Augmenting the 2002 Voting Systems Standard Nelson Hastings National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 15:04:16
643NIST hash function competition / Keccak / Advantage / Permutation / Hash function / ICE / Function / Cryptography / Mathematics / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:29:40
644Hashing / BLAKE / Opteron / Advanced Micro Devices / MD6 / Computing / Computer programming / Applied mathematics / Cryptographic hash functions / NIST hash function competition / SHA-2

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:11:44
645Espionage / Collision resistance / D3 road / Preimage attack / Hash function / Padding / Collision attack / D24 road / D22 road / Cryptography / Cryptographic hash functions / Hashing

OFFICIAL COMMENT: Khichidi-1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:56:06
646Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / Preimage attack / Block cipher / Advanced Encryption Standard / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

SHA-3 Hash Competition, Round 1 - OFFICIAL COMMENT: LESAMNTA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:13:26
647Hashing / BMW / Thomsen / Transport / Cryptographic hash function / Cryptography

OFFICIAL COMMENT:Blue Midnight Wish

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:16:16
648Computing / Hash function / SHA-2 / MD5 / Hash list / Computer programming / Information retrieval / Cryptographic hash functions / Hashing / Error detection and correction

The need for large-scale biometric testing

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2010-08-10 15:11:32
649Espionage / SHA-2 / Cyberwarfare / Collision attack / NIST hash function competition / Hash function / Collision resistance / Computing / Collision / Cryptographic hash functions / Hashing / Cryptography

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:42:06
650Block cipher / Differential cryptanalysis / Shift register / Linear feedback shift register / Cryptographic hash function / Grain / Trivium / Cryptography / Stream ciphers / VEST

Overtaking VEST Antoine Joux1,2 and Jean-René Reinhard3 1 DGA Université de Versailles St-Quentin-en-Yvelines, PRISM

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
UPDATE