Hash functions

Results: 1148



#Item
581Cryptography standards / Elliptic curve cryptography / HMAC / SHA-1 / SHA-2 / Key size / FIPS 140-2 / PBKDF2 / Crypto++ / Cryptography / Cryptographic software / Cryptographic hash functions

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-24 12:10:48
582NIST hash function competition / Cyberwarfare / Applied mathematics / Cryptography / Cryptographic hash functions / Hashing

Proposed Timeline for the Development of New Hash Functions Elaine Barker NIST [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:00:44
583Collision attack / SHA-2 / MD5 / Hash function / MD4 / RSA / Provably secure cryptographic hash function / One-way compression function / Cryptography / Cryptographic hash functions / SHA-1

C:uments and SettingsydloDocumentsPCTeX Files1padpp-yinszydlosept21.DVI

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:20:00
584Message authentication codes / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / SHA-2 / HMAC / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic hash functions

Concepteers Teleconsole TCS6U4W FIPS 140 Security Policy v1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
585Cryptographic protocols / Internet protocols / Internet standards / SHA-2 / SHA-1 / Online Certificate Status Protocol / Cambridge Rindge and Latin School / Cryptography / Cryptographic hash functions / Public-key cryptography

Shared Service Providers Com m on Policy, Certificate and CRL Profile, and Repository Profile David Cooper and Nelson Hastings January 14, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
586Hashing / Search algorithms / Collision attack / Hash function / SHA-1 / Merkle–Damgård construction / MD4 / Steganography / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Using Steganography to Improve Hash Functions’ Collision Resistance Emmanouel Kellinis1 and Konstantinos Papapanagiotou2 1 KPMG LLP, One Canada Square, London E14 5AG, United Kingdom [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:05:58
587Merkle–Damgård construction / Probability theory / Random oracle / Hash function / HMAC / Oracle machine / Collision resistance / Random function / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

Merkle Damgard Revisited: how to Construct a hash Function Jean-Sebastien Coron Yevgeniy Dodis Cecile Malinaud

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
588Cryptography / Cryptographic hash functions / Fourier analysis / Digital signal processing / Unitary operators / Fast Fourier transform / Lattice problem / Discrete Fourier transform / Collision resistance / Mathematics / Algebra / Mathematical analysis

Cryptographic Hash Workshop[removed]Provably Secure FFT Hashing Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:51:28
589Cryptographic hash functions / Internet / Cryptographic protocols / Hashing / Error detection and correction / Steven M. Bellovin / Domain Name System Security Extensions / SHA-1 / MD5 / Cryptography / Computing / Internet protocols

Cryptographic Hash Workshop[removed]Deploying New Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:02:34
590Cryptographic hash functions / SHA-1 / Mathematics

Automated Search for Round 1 Differentials for SHA-1: Work in Progress Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-05 15:52:58
UPDATE