Cryptographic hash functions

Results: 1068



#Item
541Hash function / Collision resistance / Birthday attack / Preimage attack / Collision attack / MDC-2 / One-way compression function / Cryptography / Cryptographic hash functions / Espionage

How to Construct Double-Block-Length Hash Functions ∗ Shoichi Hirose

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:49:50
542Cryptographic protocols / Computing / Advanced Encryption Standard / Cryptography standards / Internet protocols / SHA-2 / IPsec / SHA-1 / FIPS 140 / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 615j - GGM_8000_Security_Policy 1.14.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-31 11:28:11
543Error detection and correction / Cryptographic hash functions / Internet protocols / Internet standards / Secure communication / SHA-2 / FIPS 140-2 / SHA-1 / Advanced Encryption Standard / Cryptography / Computing / Cryptography standards

Microsoft Word - 01j - 1B - Axway Security Kernel FIPS[removed]Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-12 10:17:29
544Cryptography / Cross-platform software / Disk encryption / Sha1sum / Md5sum / Crypt / Linux / GNU Privacy Guard / Cryptographic hash functions / Computing / Software

CALIFORNIA STATE SCIENCE FAIR 2003 PROJECT SUMMARY Name(s) David G. McIntosh

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2003-05-10 02:03:34
545Computing / Cryptographic hash functions / Cryptographic software / Internet protocols / Advanced Encryption Standard / SHA-2 / HMAC / FIPS 140-2 / SHA-1 / Cryptography / Error detection and correction / Cryptography standards

Samsung Kernel Cryptographic Module FIPS[removed]Non-Proprietary Security Policy version 1.9 Last Update: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-19 13:05:55
546NIST hash function competition / Hashing / SHA-2 / Preimage attack / Grøstl / Keccak / Collision attack / Collision resistance / Advanced Encryption Standard / Cryptography / Error detection and correction / Cryptographic hash functions

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:20:30
547Hashing / SHA-1 / MD4 / SHA-2 / MD5 / Crypt / Collision attack / Collision resistance / Preimage attack / Cryptography / Cryptographic hash functions / Error detection and correction

Find Me a Hash Susan Landau W e’re accustomed to hearing about

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2006-02-08 14:25:14
548Cryptographic hash functions / Advanced Encryption Standard / Internet protocols / Cryptographic software / IPsec / Internet Key Exchange / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptographic protocols

Microsoft Word - 626g - S6000 Security Policy 2.9.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-31 11:31:34
549Electronic commerce / Cryptographic protocols / Cryptographic hash functions / MD5 / X.509 / SHA-1 / Public key certificate / Certificate authority / Transport Layer Security / Cryptography / Public-key cryptography / Key management

Exploiting weaknesses in the MD5 hash algorithm to subvert security on the Web

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:52:09
550Cryptographic hash functions / Error detection and correction / Hash tree / Digital signature / Cryptographic primitive / Merkle signature scheme / Lamport signature / Cryptography / Hashing / Public-key cryptography

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23
UPDATE