Hash functions

Results: 1148



#Item
561SHA-1 / SHA-2 / Merkle–Damgård construction / Hash function / Crypt / Provably secure cryptographic hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:52:44
562Collision resistance / Mathematics / Hash function / SWIFFT / Applied mathematics / Fast Fourier transform / Cyberwarfare / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Digital signal processing

Provably Secure FFT Hashing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:50:36
563SHA-1 / SHA-2 / Hash list / Hash function / Merkle–Damgård construction / Crypt / MD5 / NIST hash function competition / RIPEMD / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft Word - Workshop 2 proposal.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:53:44
564Cryptographic hash functions / NIST hash function competition / Electronic submission

This workshop considers the full range of public key technology used for security decisions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:57:34
565Cryptographic hash functions / Road surface / Road / SHA-2 / Kentucky Route 9 / Shoulder / Traffic light / Transport / Land transport / Road transport

CTC PROJECT ALLOCATIONS LIST AUGUST[removed]Project # Allocation Amount Recipient RTPA/CTC

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-08-22 10:36:37
566Cryptographic hash functions / Artificial intelligence / Information retrieval / Searching / Cryptography / Error detection and correction / Hash function

RADIOGATÚN, a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michaël Peeters* and Gilles Van Assche STMicroelectronics

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:21:14
567Hash function / Information retrieval / Artificial intelligence / Applied mathematics / Cryptographic hash functions / Cryptography / Hashing

Cryptographic Hash Workshop[removed]How to Attack a Hash Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:27:48
568Hashing / Message authentication codes / Padding / Hash function / MD5 / One-way compression function / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic Hash Workshop[removed]Enhancing the MD-Strengthening & Designing Scalable 1-Way Hash Families

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:30:02
569Cryptosystem / Key size / SHA-1 / Data Encryption Standard / FIPS 140-2 / Message authentication code / Advanced Encryption Standard / Public-key cryptography / Transport Layer Security / Cryptography / Key management / Cryptographic hash functions

Securit-e-Doc® SITT® CryptoSystem FIPS[removed]Non-Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
570Cryptography / Search algorithms / Computing / Information retrieval / Hash tree / Hash list / Hash function / MD5 / Merkle–Damgård construction / Hashing / Cryptographic hash functions / Error detection and correction

Z:rentWorkding-paperding.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:26:36
UPDATE