Cryptographic hash function

Results: 1121



#Item
741SHA-2 / Hashing / Preimage attack / Collision resistance / NIST hash function competition / Crypt / Hash function / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 10:20:26
742Error detection and correction / Computing / Cryptography / Computer programming / Mathematics / MD5 / SHA-1 / Crypt / NIST hash function competition / Cryptographic hash functions / Hashing / MD4

SHA3 WHERE WE’VE BEEN WHERE WE’RE GOING John Kelsey

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 09:09:51
743Search algorithms / MD5 / Crypt / Hash function / Cryptographic hash function / Cloud computing / Computing / Centralized computing

Microsoft Word - BreakoutSession10_final.rtf

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2010-08-26 11:03:15
744Cryptography / NIST hash function competition / Keccak / SHA-2 / SHA-1 / Crypt / Hash function / HMAC / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 15:45:01
745Centralized computing / Electronic commerce / David S. H. Rosenthal / Cloud computing / Cryptographic nonce / Amazon.com / Hash function / Computing / Digital libraries / LOCKSS

LOCKSS In The Cloud David S. H. Rosenthal LOCKSS Program Stanford University Libraries http://www.lockss.org/

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2011-07-20 14:18:22
746MD4 / SHA-1 / MD5 / SHA-2 / NIST hash function competition / Crypt / Hash function / Comparison of cryptographic hash functions / Error detection and correction / Cryptographic hash functions / Cryptography

SHA3: Past, Present and Future

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 11:09:26
747Hashing / Message authentication codes / Cryptographic hash function / Key size / FIPS 140-2 / SHA-2 / Symmetric-key algorithm / Key generation / SHA-1 / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 09:14:27
748Hashing / Message authentication codes / Cryptographic hash function / Key size / SHA-2 / Symmetric-key algorithm / FIPS 140-2 / Digital Signature Algorithm / Key / Cryptography / Key management / Cryptography standards

Microsoft Word - Draft Cryptography Section-FORMATTED[removed]doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-27 16:11:31
749Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:41
750Computing / Search algorithms / Fingerprint / Identifiers / Hash list / National Software Reference Library / SHA-1 / Computer file / Hash function / Cryptographic hash functions / Error detection and correction / Hashing

National Software Reference Library Douglas White Information Technology Laboratory July 2004

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2004-07-14 08:34:54
UPDATE