Hash functions

Results: 1148



#Item
501Peer-to-peer computing / Computing / Cryptographic hash functions / Hashing / Dwolla / Cryptography / Software / Bitcoin

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Bitcoin: Technical Background and Data Analysis

Add to Reading List

Source URL: www.federalreserve.gov

Language: English - Date: 2014-12-19 13:00:16
502Internet protocols / Secure communication / Cryptography standards / SHA-2 / HMAC / Secure Shell / Cipher suite / Key size / Key generation / Cryptography / Key management / Cryptographic hash functions

Microsoft Word - 201i - McAfee NSP V7.1 IPS-NAC SecurityPolicy v1.20.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-03 11:08:42
503Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
504Cryptographic hash functions / Road surface / Road / SHA-2 / Kentucky Route 9 / Shoulder / Traffic light / Transport / Land transport / Road transport

CTC PROJECT ALLOCATIONS LIST AUGUST[removed]Project # Allocation Amount Recipient RTPA/CTC

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-08-21 16:39:46
505Cryptographic hash functions / FIPS 140 / SHA-2 / SHA-1 / HMAC / Advanced Encryption Standard / MD5 / Crypto++ / Cryptography / Error detection and correction / Cryptography standards

Microsoft Word - 800b - AQ42-M-Security Policy_v100_draft_140813.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-12 18:31:20
506Hash list / SHA-1 / Firmware / Crypt / Computer programming / Mathematics / Cryptographic hash functions / Computing / SHA-2

Andrea Gyger From: Sent: To: Cc: Subject:

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-11-01 02:14:41
507Cryptography / Cryptographic hash functions / Internet / Cryptographic protocols / Transport Layer Security / Health Insurance Portability and Accountability Act / SHA-2 / Consent management / SHA-1 / Computing / Internet protocols / Internet standards

Recommended Standards for Privacy and Security Applicable to 2011 Certification Criteria and Meaningful Use HIT Standards Committee Source Documents Used in Creating this Matrix Posted at www.healthit.hhs.gov under the H

Add to Reading List

Source URL: publicaa.ansi.org

Language: English - Date: 2010-01-11 15:49:49
508Cryptographic hash functions / FIPS 140-2 / SHA-2 / SHA-1 / Microsoft CryptoAPI / FIPS 140 / Advanced Encryption Standard / Key size / PKCS / Cryptography / Cryptography standards / Cryptographic software

SafeGuardĀ® CryptoServer Se FIPS[removed]Non-Proprietary Security Policy http://hsm.utimaco.com Imprint

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-03 08:19:11
509Computing / Library science / Digital libraries / Preservation / Hashing / Digital preservation / Checksum / BagIt / Hash list / Error detection and correction / Archival science / Cryptographic hash functions

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: digitalpreservation.gov

Language: English - Date: 2014-10-03 14:23:22
510Computing / Library science / Digital libraries / Preservation / Hashing / Digital preservation / Checksum / BagIt / Hash list / Error detection and correction / Archival science / Cryptographic hash functions

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2014-10-03 14:23:22
UPDATE