Cryptographic hash functions

Results: 1068



#Item
521Error detection and correction / SHA-2 / SHA-1 / MD5 / Digital signature / Hash list / Hash function / Trusted timestamping / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

Long-lived digital integrity using short-lived hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:39:50
522Cryptographic hash functions / Concrete / Highways / Road / SHA-2 / Asphalt concrete / Transport / Land transport / Road transport

CTC Financial Vote List 2.5 June 25, 2014 Highway Financial Matters

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-08-07 19:33:47
523One-way compression function / Collision resistance / Quasigroup / Hash function / SHA-2 / SHA-1 / Collision attack / Collision / MD5 / Cryptographic hash functions / Cryptography / Preimage attack

Cryptographic Hash Workshop[removed]Edon-R Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:31:50
524Hashing / Hash function / Applied mathematics / Truncation / SHA-2 / Mathematics / Artificial intelligence / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Search algorithms

SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:30:12
525Collision attack / SHA-1 / MD5 / Collision resistance / SHA-2 / Hash function / RIPEMD / Birthday attack / Collision / Cryptographic hash functions / Cryptography / MD4

A Proposal of a criterion for collision resistance of hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:25:02
526Hashing / Error detection and correction / Hash function / Computing / SHA-1 / Computer programming / Bit array / Information retrieval / Cryptographic hash functions / Cryptography / Search algorithms

Cryptographic Hash Workshop[removed]LASH Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:05:44
527Cryptography standards / Hashing / Cryptographic hash functions / Advanced Encryption Standard / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Error detection and correction / Cryptographic software

Microsoft Word - 05a - Security_Policy_Model-Open SSL_HP-_Ver1 0r4_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
528Merkle–Damgård construction / Random oracle / Optimal asymmetric encryption padding / Oracle machine / SWIFFT / Cryptography / Cryptographic hash functions / Advantage

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:58:50
529Message authentication codes / Key management / Hardware security module / SHA-2 / HMAC / SHA-1 / Public-key cryptography / Key size / Key / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 3k - X3 HSM Security Policy Rev 1.08.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-11 15:42:26
530Cryptographic hash functions / Key management / X.509 / Digital signature / Validation / SHA-2 / SHA-1 / Cambridge Rindge and Latin School / Cryptography / Public-key cryptography / Cryptographic protocols

Path Validation Testing NIST Recom m endation for X.509 Path Validation David Cooper M ay 19, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
UPDATE