Hash functions

Results: 1148



#Item
791Hashing / Cryptographic hash functions / Cryptographic protocols / SHA-1 / Key size / Secure Shell / FIPS 140-2 / HMAC / IPsec / Cryptography / Cryptography standards / Internet protocols

Comments on the Transition Paper Hugo Krawczyk, .................................................................................................................2 Steve Ratcliffe, ICSA Labs...............................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-08-17 01:00:00
792Cryptographic hash functions / FIPS 140 / SHA-2 / Authentication / SHA-1 / Crypto++ / Cryptography / Cryptography standards / Computer security

Microsoft Word[removed]Sony_Gemini_v2-Security Policy_v103_20140324.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-23 13:28:41
793Message authentication codes / Advanced Encryption Standard / FIPS 140-2 / HMAC / Block cipher / Key size / SHA-1 / Symmetric-key algorithm / Padding / Cryptography / Cryptographic hash functions / Hashing

Cryptolite Security Policy-o.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
794Sha / Computing / Cryptographic hash functions / SHA-2 / SHA-1

Release Notes: DTrade v.3.0 November 22, 2013 Contents This document provides specific information for the release of DTrade v.3.0.

Add to Reading List

Source URL: pmddtc.state.gov

Language: English - Date: 2013-11-21 16:15:48
795Keccak / Joan Daemen / SHA-2 / BLAKE / Skein / JH / RadioGatún / NIST hash function competition / Cryptographic hash functions / Cryptography

SHA-3 Selection Announcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-10-02 07:45:18
796Hashing / Message authentication codes / SHA-2 / HMAC / SHA-1 / Collision resistance / Collision / Preimage attack / NIST hash function competition / Cryptography / Error detection and correction / Cryptographic hash functions

NIST SP[removed]Draft, Recommendation for Applications Using Approved Hash Algorithms

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:03:49
797Cryptography standards / Cryptographic hash functions / Message authentication codes / HMAC / Hashing / Secure Shell / SHA-2 / SHA-1 / FIPS 140-2 / Cryptography / Error detection and correction / Cryptographic software

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
798Cryptographic hash functions / Cryptography standards / Key Wrap / SHA-2 / SHA-1 / HMAC / Advanced Encryption Standard / BeeCrypt / Crypto++ / Cryptography / Cryptographic software / Hashing

Cryptographic Key Management Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-06 08:47:36
799Hash functions / Binary arithmetic / Cyclic redundancy check / HMAC / SHA-1 / Checksum / Crypt / Cksum / Hash list / Error detection and correction / Hashing / Cryptographic hash functions

Queensland Office of Gaming Regulation Hashing Algorithms (formerly titled ‘Program Signature Algorithms’) Version 1.5

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2011-05-04 23:52:02
800Password / Cryptographic software / Cryptographic hash functions / Password strength / Password manager / Security / Computer security / Cryptography

Change Your Password STEP 1 STEP 2 STEP 3

Add to Reading List

Source URL: www.sco.ca.gov

Language: English - Date: 2014-08-14 04:16:35
UPDATE