Cryptographic hash function

Results: 1121



#Item
661Message authentication codes / Cryptographic software / Key Wrap / Cryptographic hash function / Triple DES / Key generation / Digital signature / CMAC / Key size / Cryptography / Key management / Hashing

NIST’s Cryptographic Toolkit (of Standards and Recommendations)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:12:10
662Cryptographic primitive / National Institute of Standards and Technology / Cryptographic hash function / Science / Military communications / Military science / Cryptography / Ultra / Gaithersburg /  Maryland

The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies Danilo Gligoroski and Svein Johan Knapskog and Simona Samardjiska Presented by

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:15:30
663Electronic health record / Information science / SHA-1 / Hash function / Information / Health informatics / Cryptographic hash functions / Health

Microsoft Word[removed]s_Integrity_v1.1.doc

Add to Reading List

Source URL: healthcare.nist.gov

Language: English - Date: 2010-09-24 10:45:34
664Key size / Key / Cryptographic hash function / Symmetric-key algorithm / RSA / Cipher / Digital signature / PKCS / Crypt / Cryptography / Key management / Public-key cryptography

Comments received on SP[removed], Part 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-06 12:25:12
665Random number generation / SHA-2 / Cryptographic hash function / Digital Signature Algorithm / Hash function / Octet / Random password generator / Cryptography / Randomness / Pseudorandom number generators

FIPS[removed]Change Notice[removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 12:26:58
666Cryptographic hash functions / Keccak / BLAKE / Advanced Encryption Standard / Crypt / Skein / Algorithm / SHA-2 / SHA-1 / Error detection and correction / NIST hash function competition / Cryptography

outbind://132-00000000C28D6AD45D681F4D837CF97C3377EF1B070066930

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-16 14:39:14
667Computer programming / Applied mathematics / Cryptographic hash functions / NIST hash function competition / Computing

outbind://90-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:23:58
668Information science / Information retrieval / Hash function / Locality-sensitive hashing / Hash table / Cryptographic hash function / Linear hashing / Tabulation hashing / Universal hashing / Search algorithms / Hashing / Artificial intelligence

Compact Hyperplane Hashing with Bilinear Functions Wei Liu† Jun Wang‡

Add to Reading List

Source URL: icml.cc

Language: English - Date: 2012-06-07 13:19:58
669Computing / Computer programming / Cryptographic hash functions / Software engineering / Business intelligence / SAS / Hash function / Hash table / Hash list / Search algorithms / Error detection and correction / Hashing

PharmaSUG[removed]Paper CC13 Creating a Clinical Summary Table within a Single DATA Step with the Dynamic Trio: DOSUBL(), Hash Objects, and ODS Objects Joseph Hinson, Princeton, NJ ABSTRACT

Add to Reading List

Source URL: www.pharmasug.org

Language: English - Date: 2013-05-05 15:33:41
670Computing / Search algorithms / Mathematics / Numbers / Error detection and correction / Hash function / Floating point / SHA-2 / Rounding / Hashing / Cryptographic hash functions / Computer arithmetic

A Fingerprint Method for Scientific Data Verification1 Version: [removed]Micah Altman Institute for Quantitative Social Science, Harvard University 1737 Cambridge St. # 325

Add to Reading List

Source URL: thedata.org

Language: English - Date: 2013-01-06 22:42:48
UPDATE