Hash functions

Results: 1148



#Item
401Information theory / Mathematics / Discrete mathematics / Linear code / Cyclic code / SHA-1 / SHA-2 / Coding theory / Finite fields / Cryptographic hash functions

A Simple and Provably Good Code for SHA Message Expansion Charanjit S. Jutla IBM Thomas J. Watson Research Center Yorktown Heights, NY[removed]removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-05 18:05:15
402Cryptography / Cryptographic protocols / Internet protocols / Tunneling protocols / Cryptographic hash functions / IPsec / SHA-1 / Virtual private network / Passphrase / Computing / Data / Computer network security

Last update: [removed] ! & "# "

Add to Reading List

Source URL: www.vpnc.org

Language: English - Date: 2005-09-13 13:08:23
403Hashing / Search algorithms / Preimage attack / Rope / Entailment / Collision attack / Hash function / Logic / Cryptographic hash functions / Cryptography

formát Název-moje šablona pro docy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-02 11:28:32
404Law / The quick brown fox jumps over the lazy dog / Typography / Fingerprint / Expert witness / Forensic science / Evidence / MD5 / SHA-1 / Cryptographic hash functions / Evidence law / Cryptography

Lessons from prosecutions of Child Pornography and other “prohibited” material Ajoy Ghosh, Security Executive [removed] © Logica 2008.

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2009-03-31 21:25:01
405Cryptographic hash functions / SHA-1 / Phishing / Pawn / Email / Malware / Outline of chess / Budapest Gambit / Games / Chess / Spamming

A Trend Micro Research Paper Operation Pawn Storm Using Decoys to Evade Detection Loucif Kharouni

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-10-26 23:30:05
406NIST hash function competition / SHA-2 / Vlastimil Klíma / Hash function / Crypt / SHA-1 / Comparison of cryptographic hash functions / Cryptographic hash functions / Cryptography / Hashing

Microsoft PowerPoint - 1_BlueMidnightWish-Presentation-Final.ppt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-05 10:49:12
407Cryptographic software / Cryptographic hash functions / X86 architecture / Hashing / Cryptography standards / OpenSSL / SHA-2 / AES instruction set / FIPS 140-2 / Cryptography / Computer architecture / Error detection and correction

ODT Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2014-11-25 17:47:07
408Cryptographic hash functions / Computing / FIPS 140 / Cryptographic software / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptography standards

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-06 07:32:08
409Hashing / HMAC / SHA-1 / Advanced Encryption Standard / SHA-2 / Cryptographic protocols / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Word - CTP Revision[removed]regarding[removed]Step 4.doc

Add to Reading List

Source URL: www.dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
410Cryptanalysis / Cipher / Symmetric-key algorithm / Block cipher / SHA-1 / NIST hash function competition / Cryptosystem / Transport Layer Security / Lattice-based cryptography / Cryptography / Cryptographic hash functions / Cryptographic protocols

IS2: Guidelines for Authors

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-06-09 08:32:09
UPDATE