Hash functions

Results: 1148



#Item
481Cryptographic software / Cryptographic hash functions / Key generation / FIPS 140 / SHA-2 / SHA-1 / Key / Microsoft CryptoAPI / CRYPTREC / Cryptography / Key management / Cryptography standards

Microsoft Word - Proofpoint-Fips[removed]C++-Security-Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-13 13:30:44
482Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
483Cryptographic hash functions / Computer programming / Information retrieval / Computational complexity theory / Universal hashing / Hash function / Lookup table / Hashing / Search algorithms / Computing

Low-Density Parity Constraints for Hashing-Based Discrete Integration

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2014-02-16 19:30:21
484Error detection and correction / SHA-1 / Hash list / Hash function / Crypt / Digital signature / SHA / Magnet URI scheme / File verification / Cryptography / Cryptographic hash functions / Hashing

LandXML LandXML – Signing & Sealing by Warren G. Clary, PE

Add to Reading List

Source URL: www.iheep2014.com

Language: English - Date: 2015-01-22 17:50:03
485Computing / Search algorithms / Information / Data / Hash tree / Hash function / Hash list / Trie / Database index / Error detection and correction / Hashing / Cryptographic hash functions

TRUSTED ARCHIVE OVERVIEW ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-12-23 13:21:52
486Road transport / Transportation planning / Segregated cycle facilities / CTC / SHA-2 / SHA-1 / Sidewalk / Transport / Cryptographic hash functions / Land transport

CTC Allocations for December 2014 Project # Allocation Amount Recipient RTPA/CTC District-County

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-12-11 17:17:55
487SHA-1 / Computing / Cryptographic hash functions / CTC / SHA-2

CTC Financial Vote List 2.5 December 10, 2014 Highway Financial Matters

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-11-26 12:05:35
488Mechanics / MD5 / Collision / Computing / Mathematics / Cryptographic hash functions / SHA-1 / Introductory physics

New collision attacks on SHA-1 based on optimal joint local-collision analysis Marc Stevens CWI, Amsterdam, The Netherlands [removed]

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2013-03-08 06:18:23
489Peer-to-peer computing / Computing / Cryptographic hash functions / Hashing / Dwolla / Cryptography / Software / Bitcoin

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Bitcoin: Technical Background and Data Analysis

Add to Reading List

Source URL: federalreserve.gov

Language: English - Date: 2014-12-19 13:00:16
490Computing / Bitcoin / Peer-to-peer computing / Cryptographic hash functions / Error detection and correction / Proof-of-work system / Cryptographic nonce / Stakeholder / Transmission Control Protocol / Cryptography / Software / Hashing

Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake Iddo Bentov∗ Charles Lee Alex Mizrahi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-11 22:53:58
UPDATE