Hash functions

Results: 1148



#Item
681Electronic engineering / Field-programmable gate array / Luffa / Xilinx / Computing / Electronics / Cryptographic hash functions / Cucurbitaceae / NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:32:28
682Mathematics / European people / NIST hash function competition / NaSHA / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:17:14
683Merkle–Damgård construction / NIST hash function competition / Artificial intelligence / Information retrieval / Searching / Cryptographic hash functions / Fugue / Hash function

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:25:32
684NIST hash function competition / Crypt / Information retrieval / Artificial intelligence / Computing / Cryptographic hash functions / Hash function / Block cipher

outbind://216-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A04

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:39:12
685NIST hash function competition / Keccak / Advantage / Permutation / Hash function / ICE / Function / Cryptography / Mathematics / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:29:40
686Hashing / BLAKE / Opteron / Advanced Micro Devices / MD6 / Computing / Computer programming / Applied mathematics / Cryptographic hash functions / NIST hash function competition / SHA-2

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:11:44
687Premier Election Solutions / Politics / Computer network security / Technology / Diebold / SHA-1 / Computer security / SHA-2 / Electronic voting / Cryptographic hash functions / Security

Microsoft Word - TSxDuxFinalDec19.doc

Add to Reading List

Source URL: election.dos.state.fl.us

Language: English - Date: 2008-03-20 14:27:05
688Espionage / Collision resistance / D3 road / Preimage attack / Hash function / Padding / Collision attack / D24 road / D22 road / Cryptography / Cryptographic hash functions / Hashing

OFFICIAL COMMENT: Khichidi-1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:56:06
689Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / Preimage attack / Block cipher / Advanced Encryption Standard / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

SHA-3 Hash Competition, Round 1 - OFFICIAL COMMENT: LESAMNTA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:13:26
690Computing / Hash function / SHA-2 / MD5 / Hash list / Computer programming / Information retrieval / Cryptographic hash functions / Hashing / Error detection and correction

The need for large-scale biometric testing

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2010-08-10 15:11:32
UPDATE