Hash functions

Results: 1148



#Item
671SHA-2 / Daniel J. Bernstein / Mathematics / Computing / NIST hash function competition / Cryptographic hash functions / CubeHash

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:40:14
672Cryptographic hash functions / Password-authenticated key agreement / One-way function / Password / Trapdoor function / RSA / Zero-knowledge proof / Random oracle / Isomorphism / Cryptography / Cryptographic protocols / Public-key cryptography

LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
673Hashing / Password / Rainbow table / Crypt / Hash function / MD5 / Salt / Hash chain / LM hash / Cryptography / Search algorithms / Cryptographic hash functions

TALES FROM THE CRYPT0 INTRODUCTION

Add to Reading List

Source URL: www.aurainfosec.com

Language: English - Date: 2014-05-08 23:39:32
674NIST hash function competition / MD6 / Hashing / SHA-2 / Crypt / Ron Rivest / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:16:36
675SHA-2 / Hash function / Exclusive or / Grøstl / GOST / SHA-1 / Error detection and correction / Cryptographic hash functions / Cryptography

OFFICIAL COMMENT: Grostl 1 of 1 Subject: OFFICIAL COMMENT: Grostl From: "Søren S. Thomsen"

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-30 01:00:00
676Cryptography / Hash function / Information retrieval / SHA-2 / NIST hash function competition / Collision / Artificial intelligence / Computing / Cryptographic hash functions / Hashing / Search algorithms

OFFICIAL COMMENT:DynamicSHA2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:41:26
677Hashing / Error detection and correction / SHA-2 / Debian / Electronic voting / Hash function / Software / Certification of voting machines / Digital signature / Cryptography / Cryptographic hash functions / Election technology

DRAFT Pre-Decisional Material March 2, 2005 DRAFT

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 15:20:14
678Advanced Encryption Standard / Collision attack / Crypt / Collision / SHA-1 / MD4 / Cryptographic hash functions / Cryptography / NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:17:38
679Security / Cryptographic hash functions / Hashing / Information society / Premier Election Solutions / SHA-1 / HMAC / Voting machine / Optical scan voting system / Politics / Error detection and correction / Electronic voting

Microsoft Word - Florida Dec 2007 Review Response final.doc

Add to Reading List

Source URL: election.dos.state.fl.us

Language: English - Date: 2008-03-19 09:20:28
680Cryptography / Health informatics / Information science / Electronic health record / SHA-1 / Hash function / Information / Computing / Hash list / Cryptographic hash functions / Hashing / Error detection and correction

Test Procedure for §[removed]s Integrity APPROVED Version 1.0  August 13, 2010 Test Procedure for §[removed]s) Integrity This document describes the draft test procedure for evaluating conformance of complete EHRs or

Add to Reading List

Source URL: healthcare.nist.gov

Language: English - Date: 2010-08-13 13:13:32
UPDATE