Cryptographic hash functions

Results: 1068



#Item
531Public-key cryptography / Cryptographic hash functions / ISO standards / FIPS 140 / PKCS / Java Card / Gemalto / Key size / SHA-2 / Cryptography / Cryptography standards / Smart cards

Microsoft Word - 4c - D1244115_MultiApp_V3_FIPS_SP_V1.4_add contactless.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-07 16:34:14
532SHA-1 / SHA-2 / Merkle–Damgård construction / Collision attack / Tiger / HMAC / Hash function / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:02:00
533Analytic number theory / Group theory / Supersingular elliptic curve / Graph / Finite fields / Supersingular K3 surface / Homomorphic signatures for network coding / Abstract algebra / Mathematics / Elliptic curves

Cryptographic hash Functions from Expander Graphs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:47:28
534Computing / Software / Cryptographic hash functions / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / SHA-2 / SHA-1 / Cryptography / Cryptography standards / Cryptographic software

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-14 15:12:00
535RAID / ZFS / SHA-2 / Nexenta OS / SHA-1 / Checksum / File system / Solid-state drive / Computer architecture / Cryptographic hash functions / Computing / Disk file systems

ZFS on SMR Drives Enabling Shingled Magnetic Recording (SMR) for Enterprises ROBERT E. NOVAK |

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:51:22
536Search algorithms / Error detection and correction / Birthday attack / Hash function / Random oracle / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

2nd Cryptographic Hash Workshop[removed], Santa Barbara, California) How to Construct Double-Block-Length Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:51:10
537Cryptographic hash functions / Search algorithms / Collision resistance / Hash function / Hash list / Advanced Encryption Standard / Cryptography / Hashing / Error detection and correction

Hash Workshop Wrapup Agreement • Don’t really know what we are doing – AES competition was a learning experience – Big safety margin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:04:50
538Search algorithms / Collision resistance / Hash function / Digital signature / Universal one-way hash function / SHA-1 / Collision attack / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

http://www.ietf.org/internet-drafts/draft-irtf-cfrg-rhash-00.txt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:38:38
539Differential cryptanalysis / One-way compression function / Nimbus / Advanced Encryption Standard / Feistel cipher / Cryptography / Cryptographic hash functions / Block cipher

Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:52:32
540Hashing / Search algorithms / Hash function / Preimage attack / Collision attack / SHA-1 / SHA-2 / Padding / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]A Framework for Iterative Hash Functions - HAIFA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:22:00
UPDATE