Hash functions

Results: 1148



#Item
471Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.monarch.cs.rice.edu

Language: English - Date: 2002-11-20 04:48:07
472Computing / Routing algorithms / Hashing / Cryptography / Cryptographic hash functions / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Hash chain / Distance-vector routing protocol / Routing protocols / Network architecture / Routing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2003-04-07 16:01:07
473CTC / Program management / Computing / Cryptographic hash functions / SHA-1 / SHA-2

CTC Financial Vote List 2.5 Highway Financial Matters January 22, 2015

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2015-01-08 18:43:06
474Cryptography / Information retrieval / Artificial intelligence / Applied mathematics / Block cipher / Universal hashing / Hash function / Hashing / Search algorithms / Cryptographic hash functions

Improving Upon the TET Mode of Operation Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T. Road, Kolkata India[removed].

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-14 08:08:11
475Technology / Error detection and correction / IOS / ITunes / Hashing / Md5sum / IPhone / IPad / Automated teller machine / Computing / Cryptographic hash functions / Apple Inc.

10 Tips of the Day John Hally[removed]Know who you are allowing to enter a secure building or area. It is polite to hold the door open for someone, but this circumvents the purpose of physical

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:04
476Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
477Cryptography / Cryptographic hash functions / Finite fields / Hashing / Polynomials / Cyclic redundancy check / Polynomial code / Universal hashing / Polynomial / Mathematics / Error detection and correction / Algebra

1 Cryptographically Secure CRC for Lightweight Message Authentication Elena Dubrova∗ , Mats N¨aslund† , G¨oran Selander† , Fredrik Lindqvist† ∗ Royal

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 04:13:19
478Hashing / Search algorithms / Password / SHA-2 / Hash function / Crypt / Salt / PBKDF2 / Bcrypt / Cryptography / Cryptographic hash functions / Cryptographic software

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
479Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / HMAC / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
480Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / Cryptographic Module Validation Program / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 14:34:44
UPDATE