Hash functions

Results: 1148



#Item
381Cryptographic hash functions / CRYPTREC / SC2000 / Hierocrypt / FIPS 140-2 / Symmetric-key algorithm / CIPHERUNICORN-E / SHA-1 / CIPHERUNICORN-A / Cryptography / Cryptography standards / Block ciphers

4-9 C  RYPTREC Activities KUROKAWA Takashi and KANAMORI Sachiko In this paper, we show the activity of CRYPTREC between fiscal year 2006 and fiscal year 2010 in the security fundamentals group. We focus on compromise an

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:09:35
382Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Paragraph[removed]of the Code of Ethics Estate agents and salespersons should be fully conversant with the EAO, its subsidiary legislation, this Code of Ethics, and other guidelines issued by the EAA from time to time and

Add to Reading List

Source URL: text.eaa.org.hk

Language: English - Date: 2013-07-22 00:20:20
383Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski [removed] Faculty of Information Technology, Mathematics and Electrical Engin

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-12-04 13:55:47
384Public housing / Sha Tin District / Cryptographic hash functions / Sha Tin / Tai Wai / Home Ownership Scheme

For discussion on 8 December 1999 PWSC[removed]ITEM FOR PUBLIC WORKS SUBCOMMITTEE

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2005-11-03 01:30:38
385Cryptographic hash functions / Public-key cryptography / Secure communication / MD2 / MD4 / SHA-2 / SHA-1 / PKCS / X.509 / Cryptography / Cryptographic protocols / Hashing

Internet Engineering Task Force (IETF) Request for Comments: 6149 Obsoletes: 1319 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-03-07 21:32:56
386Information science / Artificial intelligence / Error detection and correction / Hash functions / Hash table / Cryptographic hash functions / Trie / Linked list / Perfect hash function / Hashing / Search algorithms / Information retrieval

VISUAL BASIC COLLECTIONS AND HASH TABLES Thomas Niemann Preface

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2014-07-10 21:19:43
387Computing / Cryptographic hash functions / Hashing / SHA-2 / Internet protocols / HMAC / Bouncy Castle / SHA-1 / IPsec / Cryptography / Error detection and correction / Cryptographic software

Bouncy Castle FIPS Java API 1 Jan[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-03-02 04:20:28
388Hashing / Key management / PBKDF2 / SHA-2 / HMAC / Crypt / MD5 / Password / Key / Cryptography / Error detection and correction / Cryptographic hash functions

MBS Xojo Encryption Kit
 Version 1.0, © [removed]by Christian Schmitz About the MBS Xojo Encryption Kit 2

Add to Reading List

Source URL: www.monkeybreadsoftware.de

Language: English - Date: 2015-03-17 06:27:44
389MD5 / SHA-1 / MD4 / Cryptography / Mathematics / Cryptographic hash functions

Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications Vlastimil Klima1, 2 [removed] http://cryptography.hyperlink.cz/ Prague, Czech Republic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-04-05 02:02:20
390SHA-2 / SHA-1 / MD4 / NIST hash function competition / MD5 / RIPEMD / Hash function / Secure Hash Standard / Crypt / Cryptographic hash functions / Error detection and correction / Cryptography

On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1 Department of Telematics, Norwegian University of Science and Technology,

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-04-18 07:19:47
UPDATE