Cryptographic hash functions

Results: 1068



#Item
41Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
42Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
43Cryptocurrencies / Error detection and correction / Hashing / Bitcoin / Cryptographic hash functions / Bitcoin network / Merkle tree / Cryptographic nonce / Hash list / Hash function / Public-key cryptography / Digital signature

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
44Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
45File sharing / BitTorrent / Cryptographic hash functions / Error detection and correction / Distributed hash table / Peer-to-peer / Gnutella / Hash list / Comparison of file sharing applications / Merkle tree

The Future of Massively Distributed Services on the Internet Mark Hapner Sun Microsystems

Add to Reading List

Source URL: hpts.ws

Language: English - Date: 2012-04-19 12:03:29
46Cryptographic hash functions / SHA-2 / SHA-1 / Radio-frequency identification / Crypt / Hash function / Secure Hash Algorithm / VEST / SHA-3

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13
47Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
48Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Hash function / SHA-2 / Password / SHA-1 / Salt / MD5 / Crypt

Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-02-03 09:25:05
49

Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-03-01 14:19:32
    50Cryptography / Cryptographic hash functions / Hashing / Cryptographic software / Key management / Crypt / Scrypt / SHA-2 / Password / Hash function / PBKDF2 / Salt

    Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-10-16 08:19:35
    UPDATE