Cryptographic hash functions

Results: 1068



#Item
401Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2003-04-07 16:01:07
402CTC / Program management / Computing / Cryptographic hash functions / SHA-1 / SHA-2

CTC Financial Vote List 2.5 Highway Financial Matters January 22, 2015

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2015-01-08 18:43:06
403Cryptography / Information retrieval / Artificial intelligence / Applied mathematics / Block cipher / Universal hashing / Hash function / Hashing / Search algorithms / Cryptographic hash functions

Improving Upon the TET Mode of Operation Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T. Road, Kolkata India[removed].

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-14 08:08:11
404Technology / Error detection and correction / IOS / ITunes / Hashing / Md5sum / IPhone / IPad / Automated teller machine / Computing / Cryptographic hash functions / Apple Inc.

10 Tips of the Day John Hally[removed]Know who you are allowing to enter a secure building or area. It is polite to hold the door open for someone, but this circumvents the purpose of physical

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:04
405Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
406Cryptography / Cryptographic hash functions / Finite fields / Hashing / Polynomials / Cyclic redundancy check / Polynomial code / Universal hashing / Polynomial / Mathematics / Error detection and correction / Algebra

1 Cryptographically Secure CRC for Lightweight Message Authentication Elena Dubrova∗ , Mats N¨aslund† , G¨oran Selander† , Fredrik Lindqvist† ∗ Royal

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 04:13:19
407Hashing / Search algorithms / Password / SHA-2 / Hash function / Crypt / Salt / PBKDF2 / Bcrypt / Cryptography / Cryptographic hash functions / Cryptographic software

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
408Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / HMAC / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
409Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / Cryptographic Module Validation Program / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 14:34:44
410Cryptographic software / Cryptographic hash functions / Key generation / FIPS 140 / SHA-2 / SHA-1 / Key / Microsoft CryptoAPI / CRYPTREC / Cryptography / Key management / Cryptography standards

Microsoft Word - Proofpoint-Fips[removed]C++-Security-Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-13 13:30:44
UPDATE