Cryptographic hash functions

Results: 1068



#Item
731Cryptographic hash functions / Computer security / Security / FIPS 140-3 / Ephemeral key / Cryptography / Cryptography standards / Key management

Computer Security Division Information Technology Laboratory

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-14 09:15:35
732Cryptographic hash functions / HMAC / Advanced Encryption Standard / SHA-2 / Pseudorandom number generator / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Hashing / Message authentication codes

Comments Received on Special Publication 800-90A, B and C

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-04 16:51:32
733SHA-2 / Hashing / Preimage attack / Collision resistance / NIST hash function competition / Crypt / Hash function / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 10:20:26
734Error detection and correction / Computing / Cryptography / Computer programming / Mathematics / MD5 / SHA-1 / Crypt / NIST hash function competition / Cryptographic hash functions / Hashing / MD4

SHA3 WHERE WE’VE BEEN WHERE WE’RE GOING John Kelsey

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 09:09:51
735Cryptography / NIST hash function competition / Keccak / SHA-2 / SHA-1 / Crypt / Hash function / HMAC / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 15:45:01
736MD4 / SHA-1 / MD5 / SHA-2 / NIST hash function competition / Crypt / Hash function / Comparison of cryptographic hash functions / Error detection and correction / Cryptographic hash functions / Cryptography

SHA3: Past, Present and Future

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 11:09:26
737Data Encryption Standard / National Security Agency / Digital Signature Algorithm / SHA-2 / SHA-1 / Key size / Secure Hash Standard / NIST hash function competition / FIPS 140-2 / Cryptography / Cryptographic hash functions / Cryptography standards

NIST Cryptographic Standards and Guidelines Development Program Briefing Book

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 13:14:41
738Cryptographic software / Cryptographic hash functions / Internet protocols / Internet standards / Secure communication / SHA-1 / Transport Layer Security / Public-key cryptography / HMAC / Cryptography / Error detection and correction / Computing

Cryptographic Technology Group Lily Chen, Acting Manager of CTG June 4, 2013 Z M (padded)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-04 17:39:21
739Computing / Search algorithms / Fingerprint / Identifiers / Hash list / National Software Reference Library / SHA-1 / Computer file / Hash function / Cryptographic hash functions / Error detection and correction / Hashing

National Software Reference Library Douglas White Information Technology Laboratory July 2004

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2004-07-14 08:34:54
740Hash function / MD5 / Computing / Md5sum / Information science / Information / Error detection and correction / Cryptographic hash functions / Hashing

Microsoft PowerPoint - grother-hash.pptx

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2011-03-28 13:00:03
UPDATE