Hash functions

Results: 1148



#Item
691Espionage / SHA-2 / Cyberwarfare / Collision attack / NIST hash function competition / Hash function / Collision resistance / Computing / Collision / Cryptographic hash functions / Hashing / Cryptography

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:42:06
692NIST hash function competition / Skein / Search algorithms / Hash function / Stefan Lucks / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

S:/MAT-DTU/SHA3 analysis/Skein-observation.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:33:42
693Set animal / Cryptographic hash functions / SHA-2 / Sha

Class of 2014 Application To Apply: Complete the application form on Page 2 Include:

Add to Reading List

Source URL: developinghistoryleaderssha.files.wordpress.com

Language: English - Date: 2014-02-13 15:24:51
694Cryptographic hash functions / Bates numbering / Hashing / Computing / Hash function / Document / Electronic discovery / Hash list / Bates / Information / Error detection and correction / Data

Microsoft Word - HASH Aticle - converted to Word from FINAL UF Publication.Corrected.doc

Add to Reading List

Source URL: www.cctinstitute.com

Language: English - Date: 2009-10-06 11:18:52
695SHA-2 / SHA-1 / Advanced Encryption Standard / Cryptographic nonce / Hash function / Cryptography / Cryptographic hash functions / Pseudorandom number generators

The NIST SP 800-90A Deterministic Random Bit Generator Validation System (DRBGVS) Updated: February 14, 2013 Previous Update: March 21, 2012 Original: March 10, 2009

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-02-14 13:50:49
696Cryptographic hash functions / Finite fields / Cryptography standards / SHA-2 / Key generation / HMAC / SHA-1 / Key Wrap / Galois/Counter Mode / Cryptography / Message authentication codes / Cryptographic software

Frequently Asked Questions For the Cryptographic Algorithm Validation Program Concerning the Validation of Cryptographic Algorithm Implementations

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 16:11:18
697Hashing / Cryptographic hash functions / Search algorithms / Error detection and correction / Hash function / Vlastimil Klíma / Base64 / Collision attack / Collision / Software / Cryptography / Computing

outbind://27-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:14:26
698NIST hash function competition / Secure Hash Standard / SHA-1 / Keccak / Federal Information Processing Standard / Crypt / National Institute of Standards and Technology / SHA-2 / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptographic hash functions

Federal Register / Vol. 79, No[removed]Wednesday, May 28, [removed]Notices product or service. In the case of a trade association, the applicant must certify that, for each company to be represented by the trade association

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-28 10:25:54
699NIST hash function competition / Hashing / Vlastimil Klíma / Preimage attack / Crypt / Hash function / CubeHash / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:14:28
700Computer architecture / Advanced Encryption Standard / SHA-1 / SHA-2 / Cell / SIMD / Crypt / MD5 / Central processing unit / Cryptographic hash functions / Computing / Cryptography

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2010-10-29 15:38:04
UPDATE