Cryptographic hash functions

Results: 1068



#Item
771Recreation / Hashing / Hash House Harriers / Interhash / Hash function / Human behavior / Hash list / Hare / Hash / Error detection and correction / Cryptographic hash functions / Search algorithms

VISITORS ARE VERY WELCOME RUN # [removed]FEB 2014 PUBLISHED BY THE JOSEPH GOEBBLES SCHOOL OF PROPAGANDA

Add to Reading List

Source URL: www.pattayajungle.com

Language: English - Date: 2014-02-03 19:21:11
772Cryptographic hash functions / Hash function / Hash list / Hash / Gluten-free diet / Information retrieval / Artificial intelligence / Computing / Error detection and correction / Hashing / Search algorithms

Microsoft Word - WH4Campout2014_rego

Add to Reading List

Source URL: www.whitehousehash.com

Language: English - Date: 2014-03-31 15:42:29
773NESSIE / Outline of cryptography / CRYPTREC / Cryptography / Cryptography standards / Cryptographic hash functions

FOR IMMEDIATE RELEASE February 27, 2003 Bart Preneel [removed]

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-22 16:57:52
774Fowler–Noll–Vo hash function / Mathematics / Landon Curt Noll / Cryptographic hash function / Hash functions / Cryptography / Error detection and correction

Generating Locally Unique point-2-point N_Port_IDs The Caffè Corretto version Landon Curt Noll T11/10-137v1

Add to Reading List

Source URL: www.t11.org

Language: English - Date: 2010-06-09 12:24:02
775Key management / Cryptographic hash functions / Error detection and correction / Invoice / SHA-1 / OpenSSL / RSA / Digital signature / X.509 / Cryptography / Public-key cryptography / Electronic commerce

Classificação: [removed] Seg.: P ú b l i c a Proc.: [removed]GABINETE DO SUBDIRETOR-GERAL DA INSPEÇÃO TRIBUTÁRIA

Add to Reading List

Source URL: info.portaldasfinancas.gov.pt

Language: English - Date: 2014-06-22 10:09:08
776Cryptographic hash functions / Hashing / Keccak / BLAKE / Grøstl / Hash function / SHA-2 / SHA-1 / Error detection and correction / NIST hash function competition / Cryptography

Microsoft PowerPoint - Presentation_SHA3.pptx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:47:32
777SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS 180-4, Secure Hash Standard (SHS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 10:52:30
778System software / Cryptography / Error detection and correction / Rsync / Remote Differential Compression / Cryptographic hash functions / Search algorithms / Rabin fingerprint / MD5 / Data synchronization / Computing / Hashing

Algorithms for Low-Latency Remote File Synchronization Hao Yan CIS Department Polytechnic University Brooklyn, NY[removed]removed]

Add to Reading List

Source URL: cis.poly.edu

Language: English - Date: 2008-03-19 17:34:34
779Search algorithms / Hash list / Computing / Hash / South Haven / Information retrieval / Artificial intelligence / Error detection and correction / Hashing / Cryptographic hash functions

September[removed]Volunteers prepared for the May Open House, welcoming new and renewing members to the first of the HASH events for[removed]Visit HASH online at historyofsouthhaven.org Become a member.

Add to Reading List

Source URL: www.historyofsouthhaven.org

Language: English - Date: 2013-11-09 09:57:43
780Error detection and correction / System software / Data synchronization / Search algorithms / Cryptographic hash functions / Rsync / Hash list / MD5 / Hash table / Computing / Hashing / Cryptography

Improved File Synchronization Techniques for Maintaining Large Replicated Collections over Slow Networks Torsten Suel Patrick Noel

Add to Reading List

Source URL: cis.poly.edu

Language: English - Date: 2003-12-23 06:13:17
UPDATE