Cryptographic hash functions

Results: 1068



#Item
721Hashing / Message authentication codes / SHA-2 / HMAC / SHA-1 / Collision resistance / Collision / Preimage attack / NIST hash function competition / Cryptography / Error detection and correction / Cryptographic hash functions

NIST SP[removed]Draft, Recommendation for Applications Using Approved Hash Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:03:49
722Cryptography standards / Cryptographic hash functions / Message authentication codes / HMAC / Hashing / Secure Shell / SHA-2 / SHA-1 / FIPS 140-2 / Cryptography / Error detection and correction / Cryptographic software

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
723Cryptographic hash functions / Cryptography standards / Key Wrap / SHA-2 / SHA-1 / HMAC / Advanced Encryption Standard / BeeCrypt / Crypto++ / Cryptography / Cryptographic software / Hashing

Cryptographic Key Management Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-06 08:47:36
724Hash functions / Binary arithmetic / Cyclic redundancy check / HMAC / SHA-1 / Checksum / Crypt / Cksum / Hash list / Error detection and correction / Hashing / Cryptographic hash functions

Queensland Office of Gaming Regulation Hashing Algorithms (formerly titled ‘Program Signature Algorithms’) Version 1.5

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2011-05-04 23:52:02
725Password / Cryptographic software / Cryptographic hash functions / Password strength / Password manager / Security / Computer security / Cryptography

Change Your Password STEP 1 STEP 2 STEP 3

Add to Reading List

Source URL: www.sco.ca.gov

Language: English - Date: 2014-08-14 04:16:35
726Search algorithms / Cryptographic hash functions / Galois/Counter Mode / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Message authentication codes

Galois MAC with forgery probability close to ideal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:16:52
727Message authentication codes / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / FIPS 140 / Key size / Cryptographic Module Validation Program / SHA-1 / HMAC / Cryptography / Cryptography standards / Error detection and correction

RSA BSAFE® Crypto-C Micro Edition[removed]FIPS[removed]Validation Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
728Cryptographic hash functions / Apache Software Foundation / Xerces / MD5 / Apache XML / Md5sum / Computing / Software / Java platform

The Apache Xerces™ Project - Downloads

Add to Reading List

Source URL: xerces.apache.org

Language: English - Date: 2013-01-20 17:05:41
729Hash function / SHA-1 / BibTeX / Computing / Artificial intelligence / Information science / Cryptographic hash functions / Search algorithms / Error detection and correction

Package ‘repmis’ July 2, 2014 Type Package Title A collection of miscellaneous tools for reproducible research with R. Description The package includes tools to load R packages and automatically generate BibTeX files

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 16:16:53
730Message authentication codes / Cryptographic hash functions / Advanced Encryption Standard / HMAC / SHA-2 / MD5 / SHA-1 / Crypt / Block cipher modes of operation / Cryptography / Error detection and correction / Hashing

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:37:57
UPDATE