First Page | Document Content | |
---|---|---|
![]() Date: 2015-08-04 11:34:10Cryptography Cryptographic hash functions Hashing NIST hash function competition SHA-3 Secure Hash Algorithm SHA-2 SHA-1 Hash-based message authentication code Secure Hash Standard Sponge function Hash function | Add to Reading List |
![]() | Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash StandardDocID: 1xVjQ - View Document |
![]() | GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface withDocID: 1rud6 - View Document |
![]() | Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00DocID: 1oV1V - View Document |
![]() | SHA-3 Standard: Permutation-Based Hash and Extendable-Output FunctionsDocID: 1lKRk - View Document |
![]() | FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITYDocID: 1lHQo - View Document |