Cryptographic hash functions

Results: 1068



#Item
561Cryptographic hash functions / Data Encryption Standard / Advanced Encryption Standard / Symmetric-key algorithm / Key size / FIPS 140-2 / Block cipher / SHA-2 / Message authentication code / Cryptography / Key management / Cryptography standards

ITS-SEC-01 Data Encryption and Cryptography

Add to Reading List

Source URL: oit.ohio.gov

Language: English - Date: 2010-03-08 12:44:45
562Error detection and correction / Search algorithms / Hash function / Hash tree / Hash list / SHA-1 / SHA-2 / Trie / Hash chain / Cryptographic hash functions / Cryptography / Hashing

Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas1 , Ahto Truu1 , Risto Laanoja1 , and Rainer Gerhards2 1 Guardtime AS, Tallinn, Estonia {ahto.buldas,ahto.truu,risto.laanoja}@guardtime.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-15 10:18:50
563Cryptographic hash functions / Blacksmith / SHA-1

11066_Cobra_Catalogue_DP.indd

Add to Reading List

Source URL: delcowindows.com

Language: English - Date: 2013-06-03 22:03:36
564Error detection and correction / Cryptographic hash functions / Fault-tolerant computer systems / Software / Bitcoin / Hash tree / Proof-of-work system / Consensus / Peer-to-peer / Computing / Cryptography / Hashing

Filecoin: A Cryptocurrency Operated File Storage Network 1e96a1b27a6cb85df68d728cf3695b0c46dbd44d filecoin.io July 15, 2014 Abstract Filecoin is a distributed electronic currency similar to Bitcoin. Unlike Bitcoin’s co

Add to Reading List

Source URL: filecoin.io

Language: English - Date: 2014-07-18 23:17:17
565Cryptography / Search algorithms / Image processing / Cryptographic hash functions / Watermark / Watermarking / Hash function / Singular value decomposition / JPEG / Algebra / Mathematics / Hashing

Appl. Math. Inf. Sci. 6 No. 2S pp. 643S-650S[removed]Applied Mathematics & Information Sciences An International Journal © 2012 NSP

Add to Reading List

Source URL: www.naturalspublishing.com

Language: English - Date: 2013-04-02 22:57:06
566Cyberwarfare / RockYou / Rainbow table / Crypt / Salt / MD5 / Security / Cryptography / Password / Cryptographic hash functions

Designing Secure Systems that People Can Use

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-02-12 16:51:10
567Public-key cryptography / Key size / Ciphertext / Key / Symmetric-key algorithm / Crypt / Cipher / Data Encryption Standard / SHA-2 / Cryptography / Key management / Cryptographic hash functions

Microsoft PowerPoint - 2013_KYCOT_SecurityMonth_UsingEncryption.pptx

Add to Reading List

Source URL: technology.ky.gov

Language: English - Date: 2013-11-05 08:59:32
568Password / Cryptographic software / Cryptographic hash functions / Password strength / Password manager / Security / Computer security / Cryptography

Change Your Password STEP 1 STEP 2 STEP 3

Add to Reading List

Source URL: sco.ca.gov

Language: English - Date: 2014-10-04 04:19:43
569State functions / Philosophy of thermal and statistical physics / Entropy / Cryptographic hash function / Hardware random number generator / Cryptography / Randomness / Thermodynamic entropy

Random Bit Generation Elaine Barker NIST September 11, 2012 Background

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:09:10
570Font family / Cryptographic hash functions / The quick brown fox jumps over the lazy dog / Typography

GotFreeFax.com Fax Test Sheet (Fonts) Font: Arial 6pt The quick brown fox jumps over the lazy dog

Add to Reading List

Source URL: www.gotfreefax.com

Language: English - Date: 2014-04-27 19:36:01
UPDATE