Hash functions

Results: 1148



#Item
641Public-key cryptography / Key size / Ciphertext / Key / Symmetric-key algorithm / Crypt / Cipher / Data Encryption Standard / SHA-2 / Cryptography / Key management / Cryptographic hash functions

Microsoft PowerPoint - 2013_KYCOT_SecurityMonth_UsingEncryption.pptx

Add to Reading List

Source URL: technology.ky.gov

Language: English - Date: 2013-11-05 08:59:32
642Password / Cryptographic software / Cryptographic hash functions / Password strength / Password manager / Security / Computer security / Cryptography

Change Your Password STEP 1 STEP 2 STEP 3

Add to Reading List

Source URL: sco.ca.gov

Language: English - Date: 2014-10-04 04:19:43
643State functions / Philosophy of thermal and statistical physics / Entropy / Cryptographic hash function / Hardware random number generator / Cryptography / Randomness / Thermodynamic entropy

Random Bit Generation Elaine Barker NIST September 11, 2012 Background

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:09:10
644Font family / Cryptographic hash functions / The quick brown fox jumps over the lazy dog / Typography

GotFreeFax.com Fax Test Sheet (Fonts) Font: Arial 6pt The quick brown fox jumps over the lazy dog

Add to Reading List

Source URL: www.gotfreefax.com

Language: English - Date: 2014-04-27 19:36:01
645Finite fields / Elliptic curve cryptography / Elliptic curve / Curve / NSA Suite B Cryptography / NIST hash function competition / SHA-2 / Elliptic Curve DSA / Cryptography / Cryptographic hash functions / Mathematics

How to manipulate curve standards: a white paper for the black hat Daniel J. Bernstein1,2 , Tung Chou1 , Chitchanok Chuengsatiansup1 , Andreas H¨ ulsing1 , 1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-23 00:04:01
646Error detection and correction / HTTP clients / Hashing / Hash list / SHA-1 / Wget / CURL / Hash function / Metalink / Software / Computing / Cryptographic hash functions

Package ‘downloader’ July 2, 2014 Maintainer Winston Chang Author Winston Chang Version 0.3 License GPL-2

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:40:07
647Message authentication codes / Cryptographic hash functions / HMAC / Internet protocols / HOTP / SHA-1 / MD5 / SHA-2 / Collision attack / Cryptography / Error detection and correction / Hashing

Attacks on SHA-1 Attacks on SHA-1 Initiative for Open AuTHentication

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:31:08
648HOTP / Computing / Message authentication codes / Cryptographic hash functions / One-time password / HMAC / Password / SHA-1 / Two-factor authentication / Cryptography / Internet protocols / Security

http://www.ietf.org/rfc/rfc4226.txt

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:04
649Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing

SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:57
650Hashing / Cryptographic hash functions / Error detection and correction / Web search engine / Web crawler / Search engine indexing / Public-key cryptography / Hash function / Point location / Information science / Cryptography / Information retrieval

Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers Michael T. Goodrich Duy Nguyen

Add to Reading List

Source URL: vldb.org

Language: English - Date: 2012-06-29 06:35:47
UPDATE