Hash functions

Results: 1148



#Item
801Search algorithms / Cryptographic hash functions / Galois/Counter Mode / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Message authentication codes

Galois MAC with forgery probability close to ideal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:16:52
802Message authentication codes / Cryptographic hash functions / Cryptographic software / FIPS 140-2 / FIPS 140 / Key size / Cryptographic Module Validation Program / SHA-1 / HMAC / Cryptography / Cryptography standards / Error detection and correction

RSA BSAFE® Crypto-C Micro Edition[removed]FIPS[removed]Validation Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
803Cryptographic hash functions / Apache Software Foundation / Xerces / MD5 / Apache XML / Md5sum / Computing / Software / Java platform

The Apache Xerces™ Project - Downloads

Add to Reading List

Source URL: xerces.apache.org

Language: English - Date: 2013-01-20 17:05:41
804Hash function / SHA-1 / BibTeX / Computing / Artificial intelligence / Information science / Cryptographic hash functions / Search algorithms / Error detection and correction

Package ‘repmis’ July 2, 2014 Type Package Title A collection of miscellaneous tools for reproducible research with R. Description The package includes tools to load R packages and automatically generate BibTeX files

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 16:16:53
805Message authentication codes / Cryptographic hash functions / Advanced Encryption Standard / HMAC / SHA-2 / MD5 / SHA-1 / Crypt / Block cipher modes of operation / Cryptography / Error detection and correction / Hashing

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:37:57
806Cryptographic hash functions / Computer security / Security / FIPS 140-3 / Ephemeral key / Cryptography / Cryptography standards / Key management

Computer Security Division Information Technology Laboratory

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-14 09:15:35
807Cryptographic hash functions / HMAC / Advanced Encryption Standard / SHA-2 / Pseudorandom number generator / Hash function / Cryptographically secure pseudorandom number generator / Cryptography / Hashing / Message authentication codes

Comments Received on Special Publication 800-90A, B and C

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-04 16:51:32
808SHA-2 / Hashing / Preimage attack / Collision resistance / NIST hash function competition / Crypt / Hash function / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

Draft FIPS 202: SHA-3 Permutation-Based Hash Standard-Status Update

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 10:20:26
809Error detection and correction / Computing / Cryptography / Computer programming / Mathematics / MD5 / SHA-1 / Crypt / NIST hash function competition / Cryptographic hash functions / Hashing / MD4

SHA3 WHERE WE’VE BEEN WHERE WE’RE GOING John Kelsey

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 09:09:51
810Cryptography / NIST hash function competition / Keccak / SHA-2 / SHA-1 / Crypt / Hash function / HMAC / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 15:45:01
UPDATE