Hash functions

Results: 1148



#Item
601Message authentication codes / Key management / Hardware security module / SHA-2 / HMAC / SHA-1 / Public-key cryptography / Key size / Key / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 3k - X3 HSM Security Policy Rev 1.08.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-11 15:42:26
602Cryptographic hash functions / Key management / X.509 / Digital signature / Validation / SHA-2 / SHA-1 / Cambridge Rindge and Latin School / Cryptography / Public-key cryptography / Cryptographic protocols

Path Validation Testing NIST Recom m endation for X.509 Path Validation David Cooper M ay 19, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
603Public-key cryptography / Cryptographic hash functions / ISO standards / FIPS 140 / PKCS / Java Card / Gemalto / Key size / SHA-2 / Cryptography / Cryptography standards / Smart cards

Microsoft Word - 4c - D1244115_MultiApp_V3_FIPS_SP_V1.4_add contactless.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-07 16:34:14
604SHA-1 / SHA-2 / Merkle–Damgård construction / Collision attack / Tiger / HMAC / Hash function / Preimage attack / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:02:00
605Analytic number theory / Group theory / Supersingular elliptic curve / Graph / Finite fields / Supersingular K3 surface / Homomorphic signatures for network coding / Abstract algebra / Mathematics / Elliptic curves

Cryptographic hash Functions from Expander Graphs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:47:28
606Differential calculus / Differential of a function / Mathematics

How to Smoke Hash (Functions)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:43:04
607Computing / Software / Cryptographic hash functions / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / SHA-2 / SHA-1 / Cryptography / Cryptography standards / Cryptographic software

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-14 15:12:00
608RAID / ZFS / SHA-2 / Nexenta OS / SHA-1 / Checksum / File system / Solid-state drive / Computer architecture / Cryptographic hash functions / Computing / Disk file systems

ZFS on SMR Drives Enabling Shingled Magnetic Recording (SMR) for Enterprises ROBERT E. NOVAK |

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:51:22
609Search algorithms / Error detection and correction / Birthday attack / Hash function / Random oracle / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

2nd Cryptographic Hash Workshop[removed], Santa Barbara, California) How to Construct Double-Block-Length Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:51:10
610Cryptographic hash functions / Search algorithms / Collision resistance / Hash function / Hash list / Advanced Encryption Standard / Cryptography / Hashing / Error detection and correction

Hash Workshop Wrapup Agreement • Don’t really know what we are doing – AES competition was a learning experience – Big safety margin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:04:50
UPDATE