Cryptographic hash function

Results: 1121



#Item
651NIST hash function competition / Skein / Search algorithms / Hash function / Stefan Lucks / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

S:/MAT-DTU/SHA3 analysis/Skein-observation.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:33:42
652Cryptographic hash functions / Bates numbering / Hashing / Computing / Hash function / Document / Electronic discovery / Hash list / Bates / Information / Error detection and correction / Data

Microsoft Word - HASH Aticle - converted to Word from FINAL UF Publication.Corrected.doc

Add to Reading List

Source URL: www.cctinstitute.com

Language: English - Date: 2009-10-06 11:18:52
653Computer file formats / Disk images / Computer forensics / Computer storage media / Forensic Toolkit / USB flash drive / Backup / Disk formatting / Cryptographic hash function / Computing / System software / Archive formats

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2008-08-19 16:28:31
654SHA-2 / SHA-1 / Advanced Encryption Standard / Cryptographic nonce / Hash function / Cryptography / Cryptographic hash functions / Pseudorandom number generators

The NIST SP 800-90A Deterministic Random Bit Generator Validation System (DRBGVS) Updated: February 14, 2013 Previous Update: March 21, 2012 Original: March 10, 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-14 13:50:49
655Centralized computing / Electronic commerce / David S. H. Rosenthal / Cloud computing / Cryptographic nonce / Amazon.com / Hash function / Computing / Digital libraries / LOCKSS

LOCKSS In The Cloud David S. H. Rosenthal LOCKSS Program Stanford University Libraries http://www.lockss.org/

Add to Reading List

Source URL: www.lockss.org

Language: English - Date: 2011-07-25 17:34:32
656Hashing / Cryptographic hash functions / Search algorithms / Error detection and correction / Hash function / Vlastimil Klíma / Base64 / Collision attack / Collision / Software / Cryptography / Computing

outbind://27-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:14:26
657NIST hash function competition / Secure Hash Standard / SHA-1 / Keccak / Federal Information Processing Standard / Crypt / National Institute of Standards and Technology / SHA-2 / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptographic hash functions

Federal Register / Vol. 79, No[removed]Wednesday, May 28, [removed]Notices product or service. In the case of a trade association, the applicant must certify that, for each company to be represented by the trade association

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-28 10:25:54
658NIST hash function competition / Hashing / Vlastimil Klíma / Preimage attack / Crypt / Hash function / CubeHash / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:14:28
659Cryptographic hash function / Two-factor authentication / Service-oriented architecture / Electronic signature / Digital signature / Password cracking / Skype security / Cryptography / Security / Password

Microsoft Word - IDEM eAuth Success Story ks edit.docx

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2014-07-31 19:42:26
660Hashing / Pseudorandomness / Key derivation function / Cryptographic hash function / Pseudorandom function family / Key / HMAC / Randomness extractor / Symmetric-key algorithm / Cryptography / Key management / Message authentication codes

NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:56:02
UPDATE