Hash functions

Results: 1148



#Item
621Cryptographic hash functions / Advanced Encryption Standard / Internet protocols / Cryptographic software / IPsec / Internet Key Exchange / SHA-2 / SHA-1 / HMAC / Cryptography / Error detection and correction / Cryptographic protocols

Microsoft Word - 626g - S6000 Security Policy 2.9.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-31 11:31:34
622Electronic commerce / Cryptographic protocols / Cryptographic hash functions / MD5 / X.509 / SHA-1 / Public key certificate / Certificate authority / Transport Layer Security / Cryptography / Public-key cryptography / Key management

Exploiting weaknesses in the MD5 hash algorithm to subvert security on the Web

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:52:09
623Fingers / Human anatomy / Identification / Security / Anatomy / Public key fingerprint / Hash function / Surveillance / Fingerprints / Biometrics / Fingerprint

Package ‘fingerprint’ July 2, 2014 Version 3.5.2 Date 2013-10-27 Title Functions to operate on binary fingerprint data Author Rajarshi Guha

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:51:44
624Cryptographic hash functions / Error detection and correction / Hash tree / Digital signature / Cryptographic primitive / Merkle signature scheme / Lamport signature / Cryptography / Hashing / Public-key cryptography

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23
625SHA-2 / Computing / Cryptographic hash functions / SHA-1 / CTC

CTC PROJECT ALLOCATIONS FOR JUNE 2014 PPNO Project # Program/Year Allocation Amount Prgm’d Amount

Add to Reading List

Source URL: www.caltrans.ca.gov

Language: English - Date: 2014-06-27 13:16:19
626Cryptographic software / Elliptic Curve DSA / SHA / Key size / Cryptography standards / NSA Suite B Cryptography / SHA-2 / Cryptography / Cryptographic hash functions / SHA-1

Legend for Description Field for Historical FIPS[removed]ECDSA Signature Generation Component Last Update: [removed]NOTICE: The SP800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-01-08 12:26:15
627Search algorithms / Hash functions / MD5 / SHA-1 / Rolling hash / Error detection and correction / Hashing / Cryptographic hash functions

ManTech SMA Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-03-18 21:36:18
628NIST hash function competition / SHA-2 / Advanced Encryption Standard process / SHA-1 / Secure Hash Standard / Hash function / SANDstorm hash / Cryptographic hash functions / Error detection and correction / Cryptography

What hash functions were based on block ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:10:16
629Cryptographic hash functions / SHA-2 / Kentucky Route 9 / CTC / Road surface / Highway / Transport / Road transport / Land transport

CTC PROJECT ALLOCATION LIST – MAY 2014 Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: www.caltrans.ca.gov

Language: English - Date: 2014-05-22 13:27:43
630Error detection and correction / Cryptography / Information retrieval / Computing / Hash function / Hash table / Associative array / Hash list / Comparison of programming languages / Hashing / Search algorithms / Cryptographic hash functions

Package ‘hash’ July 2, 2014 Type Package Title Full feature implementation of hash/associated arrays/dictionaries Version[removed]Date[removed]

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 12:06:36
UPDATE