Cryptographic hash functions

Results: 1068



#Item
761Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation

A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
762GOST / NIST hash function competition / Hashing / Keccak / Advanced Encryption Standard / OpenSSL / Block cipher / Data Encryption Standard / ARIA / Cryptography / GOST standards / Cryptographic hash functions

S TRI B OB : Authenticated Encryption from GOST R[removed]LPS Permutation (Extended Abstract) Markku-Juhani O. Saarinen ∗ Norwegian University of Science and Technology [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2014-05-31 01:59:06
763SHACAL / RC6 / RC5 / SHA-1 / SHA-2 / NESSIE / Crypt / Outline of cryptography / Encryption by date / Cryptography / Block ciphers / Cryptographic hash functions

Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

Add to Reading List

Source URL: ccc.ustc.edu.cn

Language: English - Date: 2006-10-24 07:55:02
764Cryptographic hash functions / Electronic commerce / SHA-1 / SHA-2 / Public key certificate / Public key infrastructure / Sha / Cryptography / Public-key cryptography / Key management

Status Update for DTrade PKI/SHA-256 Digital Certificate Upgrade Industry Notice: DTrade PKI/SHA-256 Digital Certificates DDTC is upgrading the DTrade system to ensure compliance with the use of Access Certificates for E

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2013-11-12 10:52:02
765Error detection and correction / Hashing / Information / National Software Reference Library / Computing / Fingerprint / Nationalsozialistischer Reichsbund für Leibesübungen / SHA-1 / Hash list / Cryptographic hash functions / National Institute of Standards and Technology / United States Department of Commerce

Report to U.S. Election Assistance Commission July 13, 2004 The National Institute of Standards and Technology (NIST) has run the National Software Reference Library (NSRL) project since[removed]The NSRL provides the means

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2004-07-14 08:34:40
766Sha / Computing / Cryptographic hash functions / SHA-2 / SHA-1

Release Notes: DTrade v.3.0 November 22, 2013 Contents This document provides specific information for the release of DTrade v.3.0.

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2013-11-21 16:15:48
767Hashing / Computing / NIST hash function competition / Skein / Threefish / Hash tree / Hash function / B-tree / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

parSkein-tm-final_eprint.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-10-02 04:40:32
768Hash function / Hash list / Hash / Information retrieval / Artificial intelligence / Computing / Error detection and correction / Hashing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: firejune.com

Language: English - Date: 2014-07-18 16:19:14
769Cultural history / Cryptographic hash functions / Hashing / Search algorithms / Hash House Harriers / Three hares / Hua Hin District / Hash function / Hare / Visual arts / Error detection and correction / Culture

VISITORS ARE VERY WELCOME RUN # [removed]JUNE 2014 PUBLISHED BY THE JOSEPH GOEBBLES SCHOOL OF PROPAGANDA

Add to Reading List

Source URL: www.pattayajungle.com

Language: English - Date: 2014-06-05 22:22:40
770Search algorithms / Recreation / Hash House Harriers / Hash function / Hua Hin District / Hash list / Pattaya / Hash / Hare / Error detection and correction / Cryptographic hash functions / Hashing

VISITORS ARE VERY WELCOME RUN # [removed]APRIL 2014 PUBLISHED BY THE JOSEPH GOEBBLES SCHOOL OF PROPAGANDA

Add to Reading List

Source URL: www.pattayajungle.com

Language: English - Date: 2014-04-26 20:32:40
UPDATE