Cryptographic hash functions

Results: 1068



#Item
661Error detection and correction / Data types / Information retrieval / Computer programming / Cryptographic hash functions / Hash function / Hash table / Set / Hash list / Search algorithms / Hashing / Computing

PDF Document

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2014-07-23 21:16:50
662Road transport / SHA-1 / SHA-2 / CTC / Segregated cycle facilities / Road surface / Kentucky Route 9 / Electronic Arts / Transport / Cryptographic hash functions / Land transport

CTC PROJECT ALLOCATION LIST FOR MARCH 2014 Project # Allocation Amount Recipient RTPA/CTC Dist-Co-Rte

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-03-21 18:01:44
663Key management / Crypt / Hashing / Bcrypt / Salt / Password / Hash function / Key derivation function / MD5 / Cryptography / Search algorithms / Cryptographic software

CRYPT(3) Library functions CRYPT(3)

Add to Reading List

Source URL: openwall.com

Language: English - Date: 2009-09-07 19:42:15
664Road transport / SHA-1 / SHA-2 / CTC / Segregated cycle facilities / Road surface / Kentucky Route 9 / Electronic Arts / Transport / Cryptographic hash functions / Land transport

CTC PROJECT ALLOCATION LIST FOR MARCH 2014 Project # Allocation Amount Recipient RTPA/CTC Dist-Co-Rte

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-03-21 17:26:21
665SHA-2 / Computing / Cryptographic hash functions / CTC / SHA-1

JANUARY 2014 CTC PROJECT ALLOCATION LIST Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-01-31 16:02:39
666Cryptographic hash functions / SHA-2 / Kentucky Route 9 / CTC / Road surface / Highway / Transport / Road transport / Land transport

CTC PROJECT ALLOCATION LIST – MAY 2014 Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-05-23 14:05:31
667Mathematical analysis / Cryptographic hash functions / NIST hash function competition / ARX

ARXtools: A toolkit for ARX analysis Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:40:14
668Hashing / Search algorithms / Preimage attack / Collision resistance / Merkle–Damgård construction / JH / Collision attack / Hash function / Random oracle / Cryptography / Cryptographic hash functions / NIST hash function competition

SHA-3 Conference, March 2012, Improved Indifferentiability Security Bound for the JH Mode Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:56:40
669Keccak / Joan Daemen / Block ciphers / Skein / Threefish / Grøstl / Cryptography / NIST hash function competition / Cryptographic hash functions

Security Analysis Submissions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 12:50:52
670Ute / Keccak / NIST hash function competition / Cryptographic hash functions

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:39:22
UPDATE