Hash functions

Results: 1148



#Item
491Computing / Library science / Digital libraries / Preservation / Hashing / Digital preservation / Checksum / BagIt / Hash list / Error detection and correction / Archival science / Cryptographic hash functions

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2014-10-03 14:23:22
492Key management / Electronic commerce / SHA-2 / SHA-1 / Public key certificate / Academic certificate / Cryptography / Cryptographic hash functions / Public-key cryptography

TA[removed]Secure Certificate Service SHA-1 Deprecation

Add to Reading List

Source URL: www.dts.ca.gov

Language: English - Date: 2014-11-25 14:16:44
493Software / Cryptographic hash functions / Rsync / Remote Differential Compression / SHA-1 / NTFS / Chunking / Ed2k URI scheme / Data deduplication / Computing / System software / Data synchronization

1 Optimizing File Replication over Limited-Bandwidth Networks using Remote Differential Compression Dan Teodosiu, Nikolaj Bjørner, Yuri Gurevich, Mark Manasse, Joe Porkka {danteo, nbjorner, gurevich, manasse, jporkka}

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-11-08 11:56:38
494Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cryptographic hash functions / Metrology / NIST hash function competition / Metre / Uncertainty / Text Retrieval Conference / Measurement / Science / Knowledge

Information Technology Laboratory Newsletter INSIDE THIS ISSUE November—December 2014

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-10-29 16:09:26
495Computing / Search algorithms / Data / Information / Database management systems / Hash function / Hash tree / Hash list / Trie / Error detection and correction / Cryptographic hash functions / Hashing

METHODOLOGY: TRUSTED ARCHIVE ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-11-25 15:11:47
496Key management / Electronic commerce / SHA-2 / SHA-1 / Public key certificate / Academic certificate / Cryptography / Cryptographic hash functions / Public-key cryptography

TA[removed]Secure Certificate Service SHA-1 Deprecation

Add to Reading List

Source URL: www.otech.ca.gov

Language: English - Date: 2014-11-25 14:16:44
497Error detection and correction / Hashing / Cryptographic hash functions / Cryptographic software / HMAC / FIPS 140-2 / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Cryptography standards / Spaceflight

Microsoft Word - 23g - ISS HA-ECT FIPS[removed]Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 08:43:12
498Cryptographic protocols / FIPS 140-2 / FIPS 140 / Internet standards / SHA-2 / Password / X.509 / SHA-1 / NSA Suite B Cryptography / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 217f - Dell SonicWALL SRA EX9000 Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-12 10:14:41
499Cryptographic software / Advanced Encryption Standard / FIPS 140-2 / SHA-1 / SHA-2 / PKCS / Key size / Cryptographic Module Validation Program / HMAC / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 1i - SKB_4.6.0_Security_Policy_2014[removed]docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-02 08:38:26
500Internet protocols / Data / Secure communication / Hashing / Cryptographic hash functions / HMAC / IPsec / Cipher suite / SHA-1 / Cryptography / Cryptographic protocols / Computing

Microsoft Word - 8e - 4x_RFS7K_Crypto_Module_Security_Policy R1.2.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 16:11:46
UPDATE