Hash functions

Results: 1148



#Item
761NIST hash function competition / Hashing / Message authentication codes / Keccak / SHA-2 / HMAC / SHA-1 / Skein / JH / Error detection and correction / Cryptography / Cryptographic hash functions

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:22:44
762Cryptographic hash functions / SHA-2 / SHA-1 / CTC / Road surface / Segregated cycle facilities / Electronic Arts / Highway / Road / Transport / Road transport / Land transport

CTC Financial Vote List 2.5 Highway Financial Matters Project # Allocation Amount County

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-03-18 17:33:50
763SHA-1 / Construction / California postmile / Project management / Program management / SHA-2 / Business / History of the United States / Computing / Cryptographic hash functions / CTC / American Recovery and Reinvestment Act

CTC Financial Vote List 2.5 Highway Financial Matters Project # Allocation Amount County

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2013-03-18 14:48:44
764CTC / Massachusetts Route 2 / Cryptographic hash functions / California postmile / SHA-2

Microsoft Word[removed]Vote.doc

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2011-09-13 13:49:13
765CTC / Electronic Arts / California postmile / Software development / Video game development / Cryptographic hash functions / SHA-2

Microsoft Word[removed]Vote.doc

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2012-04-06 19:45:23
766Computing / Search algorithms / Data / Cryptographic hash functions / Hash function / MongoDB / Hash list / Data management / Error detection and correction / Hashing

Data distribution Introduction to MongoDB Will LaForest Senior Director of 10gen Federal [removed]

Add to Reading List

Source URL: files.meetup.com

Language: English - Date: 2012-12-11 23:15:33
767Cryptographic hash functions / HMAC / MD5 / CyberGraphX / SHA-1 / Operating system / Public-key cryptography / Cryptography / Error detection and correction / Hashing

Information Resource Engineering Inc. CGX Cryptographic Module Security Policy version 1.24 last revision 24 March 2000

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
768Cryptographic hash functions / Campbell County /  Kentucky / Kentucky Route 9 / Road / Segregated cycle facilities / SHA-1 / CTC / SHA-2 / Construction / Transport / Road transport / Land transport

CTC Financial Vote List 2.5 June 25, 2014 Highway Financial Matters

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-06-13 11:50:59
769Cryptographic hash functions / Computing / FIPS 140 / SHA-2 / SHA-1 / HMAC / MD5 / Crypto++ / Error detection and correction / Cryptography / Cryptography standards

FIPS[removed]Non-Proprietary Security Policy Aspen Document Version[removed]Sony Corporation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-21 13:06:22
770Cryptography standards / Cryptographic hash functions / Message authentication codes / Cryptographic software / HMAC / FIPS 140-2 / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Error detection and correction / Hashing

BitArmor Secure Cryptographic Engine Version 1.2 Security Policy v 1.1 BitArmor Systems, Inc 401 Liberty Avenue, Suite 1900

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-12-11 00:00:00
UPDATE