Hash functions

Results: 1148



#Item
611Search algorithms / Collision resistance / Hash function / Digital signature / Universal one-way hash function / SHA-1 / Collision attack / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

http://www.ietf.org/internet-drafts/draft-irtf-cfrg-rhash-00.txt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:38:38
612Differential cryptanalysis / One-way compression function / Nimbus / Advanced Encryption Standard / Feistel cipher / Cryptography / Cryptographic hash functions / Block cipher

Caligo, An Extensible Block Cipher and CHash, A Caligo Based Hash

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:52:32
613Hashing / Search algorithms / Hash function / Preimage attack / Collision attack / SHA-1 / SHA-2 / Padding / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]A Framework for Iterative Hash Functions - HAIFA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:22:00
614Hash function / Collision resistance / Birthday attack / Preimage attack / Collision attack / MDC-2 / One-way compression function / Cryptography / Cryptographic hash functions / Espionage

How to Construct Double-Block-Length Hash Functions ∗ Shoichi Hirose

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:49:50
615Cryptographic protocols / Computing / Advanced Encryption Standard / Cryptography standards / Internet protocols / SHA-2 / IPsec / SHA-1 / FIPS 140 / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Word - 615j - GGM_8000_Security_Policy 1.14.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-31 11:28:11
616Error detection and correction / Cryptographic hash functions / Internet protocols / Internet standards / Secure communication / SHA-2 / FIPS 140-2 / SHA-1 / Advanced Encryption Standard / Cryptography / Computing / Cryptography standards

Microsoft Word - 01j - 1B - Axway Security Kernel FIPS[removed]Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-12 10:17:29
617Cryptography / Cross-platform software / Disk encryption / Sha1sum / Md5sum / Crypt / Linux / GNU Privacy Guard / Cryptographic hash functions / Computing / Software

CALIFORNIA STATE SCIENCE FAIR 2003 PROJECT SUMMARY Name(s) David G. McIntosh

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2003-05-10 02:03:34
618Computing / Cryptographic hash functions / Cryptographic software / Internet protocols / Advanced Encryption Standard / SHA-2 / HMAC / FIPS 140-2 / SHA-1 / Cryptography / Error detection and correction / Cryptography standards

Samsung Kernel Cryptographic Module FIPS[removed]Non-Proprietary Security Policy version 1.9 Last Update: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-19 13:05:55
619NIST hash function competition / Hashing / SHA-2 / Preimage attack / Grøstl / Keccak / Collision attack / Collision resistance / Advanced Encryption Standard / Cryptography / Error detection and correction / Cryptographic hash functions

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:20:30
620Hashing / SHA-1 / MD4 / SHA-2 / MD5 / Crypt / Collision attack / Collision resistance / Preimage attack / Cryptography / Cryptographic hash functions / Error detection and correction

Find Me a Hash Susan Landau W e’re accustomed to hearing about

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2006-02-08 14:25:14
UPDATE