Cryptographic hash functions

Results: 1068



#Item
701Hashing / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / HMAC / FIPS 140 / SHA-2 / SHA-1 / BlackBerry Enterprise Server / Cryptography / Error detection and correction / Cryptography standards

Microsoft Word - TID[removed]140sp591.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-08 00:00:00
702Cryptographic hash functions / SHA-2 / United States Department of Housing and Urban Development

SHA COMMUNITY NEWSLETTER Summer 2012 | Volume 12, Issue 3 THE DIRECTORS CHAIR As the HOT summer weather sets in I would like to take this opportunity to bring to all our residents attention the

Add to Reading List

Source URL: www.shanc.org

Language: English - Date: 2013-01-29 14:29:49
703Cryptographic hash functions / Search algorithms / Bloom filter / Hash function / Fingerprint / Crypt / Rabin fingerprint / SHA-1 / Feature selection / Cryptography / Hashing / Error detection and correction

Chapter 8 DATA FINGERPRINTING WITH SIMILARITY DIGESTS Vassil Roussev Abstract

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
704Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
705Cryptography standards / Hashing / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / SHA-1 / Block cipher / Key size / Padding / Cryptography / Cryptographic hash functions / Error detection and correction

FIPS140-2 Security Policy for IBM CryptoLite in C (CLiC) FIPS140-2 Security Policy for CryptoLite in C (CLiC)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
706Cryptographic hash functions / Electronic commerce / SHA-1 / SHA-2 / Public key certificate / Public key infrastructure / Sha / Cryptography / Public-key cryptography / Key management

Status Update for DTrade PKI/SHA-256 Digital Certificate Upgrade Industry Notice: DTrade PKI/SHA-256 Digital Certificates DDTC is upgrading the DTrade system to ensure compliance with the use of Access Certificates for E

Add to Reading List

Source URL: pmddtc.state.gov

Language: English - Date: 2013-11-12 10:52:02
707Cryptographic hash functions / Key management / Cryptography standards / HMAC / FIPS 140-2 / Zeroisation / SHA-2 / SHA-1 / Key size / Cryptography / Error detection and correction / Cryptographic software

1B - Crypto-C ME Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
708SHA-2 / SHA-1 / Crypt / Hash function / Transport Layer Security / Error detection and correction / Cryptographic hash functions / Cryptography

The Secure Hash Algorithm Validation System (SHAVS) Updated: May 21, 2014 Created: July 22, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-21 09:13:37
709Computer programming / Software engineering / Search algorithms / Spam filtering / Cryptographic hash functions / Bloom filter / Hash function / Type I and type II errors / G factor / Hashing / Computing / Error detection and correction

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
710Cryptographic hash functions / URI schemes / Hash function / Fragment identifier / Hash list / Information / Artificial intelligence / Error detection and correction / Hashing / Search algorithms

Vassil Roussev The Current Forensic Workflow Forensic Target (3TB)

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:02
UPDATE