Cryptographic hash functions

Results: 1068



#Item
611NIST hash function competition / Keccak / Advantage / Permutation / Hash function / ICE / Function / Cryptography / Mathematics / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:29:40
612Hashing / BLAKE / Opteron / Advanced Micro Devices / MD6 / Computing / Computer programming / Applied mathematics / Cryptographic hash functions / NIST hash function competition / SHA-2

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:11:44
613Premier Election Solutions / Politics / Computer network security / Technology / Diebold / SHA-1 / Computer security / SHA-2 / Electronic voting / Cryptographic hash functions / Security

Microsoft Word - TSxDuxFinalDec19.doc

Add to Reading List

Source URL: election.dos.state.fl.us

Language: English - Date: 2008-03-20 14:27:05
614Espionage / Collision resistance / D3 road / Preimage attack / Hash function / Padding / Collision attack / D24 road / D22 road / Cryptography / Cryptographic hash functions / Hashing

OFFICIAL COMMENT: Khichidi-1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:56:06
615Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / Preimage attack / Block cipher / Advanced Encryption Standard / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

SHA-3 Hash Competition, Round 1 - OFFICIAL COMMENT: LESAMNTA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:13:26
616Computing / Hash function / SHA-2 / MD5 / Hash list / Computer programming / Information retrieval / Cryptographic hash functions / Hashing / Error detection and correction

The need for large-scale biometric testing

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2010-08-10 15:11:32
617Espionage / SHA-2 / Cyberwarfare / Collision attack / NIST hash function competition / Hash function / Collision resistance / Computing / Collision / Cryptographic hash functions / Hashing / Cryptography

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:42:06
618NIST hash function competition / Skein / Search algorithms / Hash function / Stefan Lucks / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

S:/MAT-DTU/SHA3 analysis/Skein-observation.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:33:42
619Set animal / Cryptographic hash functions / SHA-2 / Sha

Class of 2014 Application To Apply: Complete the application form on Page 2 Include:

Add to Reading List

Source URL: developinghistoryleaderssha.files.wordpress.com

Language: English - Date: 2014-02-13 15:24:51
620Cryptographic hash functions / Bates numbering / Hashing / Computing / Hash function / Document / Electronic discovery / Hash list / Bates / Information / Error detection and correction / Data

Microsoft Word - HASH Aticle - converted to Word from FINAL UF Publication.Corrected.doc

Add to Reading List

Source URL: www.cctinstitute.com

Language: English - Date: 2009-10-06 11:18:52
UPDATE