Cryptographic hash functions

Results: 1068



#Item
41LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
42Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
43Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto  www.bitcoin.org  Abstract. A purely peer-to-peer version of electronic cash would allow online

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
44Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper  1

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
45The Future of Massively Distributed Services on the Internet Mark Hapner Sun Microsystems

The Future of Massively Distributed Services on the Internet Mark Hapner Sun Microsystems

Add to Reading List

Source URL: hpts.ws

Language: English - Date: 2012-04-19 12:03:29
46Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13
47Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
48Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-02-03 09:25:05
49Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-03-01 14:19:32
    50Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

    Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-10-16 08:19:35