Cryptographic hash function

Results: 1121



#Item
751Hash function / MD5 / Computing / Md5sum / Information science / Information / Error detection and correction / Cryptographic hash functions / Hashing

Microsoft PowerPoint - grother-hash.pptx

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2011-03-28 13:00:03
752Hashing / MD4 / Search algorithms / MD5 / Cyclic redundancy check / Checksum / SHA-1 / Crypt / Hash function / Error detection and correction / Cryptography / Cryptographic hash functions

SELECTION OF HASHING ALGORITHMS Tim Boland Gary Fisher JUNE 30, 2000 INTRODUCTION

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2002-12-31 14:22:10
753Joan Daemen / SHA-2 / John Kelsey / Crypt / Lane / Mathematics / Computing / NIST hash function competition / Cryptographic hash functions / Keccak

SHA[removed]Workshop August 22, 2014 University of California, Santa Barbara [Corwin Pavilion] Friday August 22, 2014 9:00 – 9:10

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 13:08:02
754Search algorithms / Hash function / Hash list / Information retrieval / Artificial intelligence / Computing / Error detection and correction / Hashing / Cryptographic hash functions

Creating Hash Sets manually by Sharren Redmond These are the files we and values we want to create a hash set for: FILE NAME ADR001.JPG ADR001P.JPG

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2004-05-28 07:35:48
755Search algorithms / Computing / National Software Reference Library / United States Department of Commerce / Hash function / Crypt / Hash list / Information retrieval / Artificial intelligence / Error detection and correction / Hashing / Cryptographic hash functions

Hashing of File Blocks: When Exact Matches Are Not Useful Douglas White Disclaimer

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2008-02-25 14:12:49
756SHA-2 / SHA-1 / MD4 / MD5 / Crypt / Fingerprint / Public key fingerprint / Hash function / Preimage attack / Cryptographic hash functions / Cryptography / Computing

NIST’s National Software Reference Library Douglas White, Software Diagnostics & Conformance Testing Division

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2004-11-16 07:11:22
757National Institute of Standards and Technology / National Software Reference Library / United States Department of Commerce / Hash function / SHA-1 / Traceability / Computing / Artificial intelligence / Telecommunications engineering / Search algorithms / Cryptographic hash functions / Error detection and correction

NIST National Software Reference Library (NSRL) Douglas White September 28, 2005 [removed]

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2005-09-26 12:56:20
758TRE / Crypt / Hash function / Artificial intelligence / Software / Computing / Computer vision / Cryptographic hash function / Cryptography / Hashing

Definition and Terminology of Approximate Matching Approximate matching is a technique for identifying similarities between or among digital objects, such as files, storage media, or network streams, which do not match

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2013-08-02 17:04:09
759SHA-2 / SHA-1 / MD5 / Sha1sum / Md5sum / Checksum / Hash function / Public key fingerprint / Tiger / Cryptographic hash functions / Cryptography / Computing

PDF Document

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2003-08-28 10:36:40
760Key management / Access control / Authentication / United States Government Printing Office / Federal Depository Library Program / Cryptographic hash function / Federal Digital System / Digital signature / Cryptography / Notary / Public-key cryptography

Overview of GPO’s Authentication Program For more than 150 years, the core mission of the U.S. Government Printing Office (GPO), Keeping American Informed, has remained unchanged. Since 1861 users have looked to GPO as

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-06-15 07:11:55
UPDATE