Hash functions

Results: 1148



#Item
821Search algorithms / Computing / National Software Reference Library / United States Department of Commerce / Hash function / Crypt / Hash list / Information retrieval / Artificial intelligence / Error detection and correction / Hashing / Cryptographic hash functions

Hashing of File Blocks: When Exact Matches Are Not Useful Douglas White Disclaimer

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2008-02-25 14:12:49
822SHA-2 / SHA-1 / MD4 / MD5 / Crypt / Fingerprint / Public key fingerprint / Hash function / Preimage attack / Cryptographic hash functions / Cryptography / Computing

NIST’s National Software Reference Library Douglas White, Software Diagnostics & Conformance Testing Division

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2004-11-16 07:11:22
823National Institute of Standards and Technology / National Software Reference Library / United States Department of Commerce / Hash function / SHA-1 / Traceability / Computing / Artificial intelligence / Telecommunications engineering / Search algorithms / Cryptographic hash functions / Error detection and correction

NIST National Software Reference Library (NSRL) Douglas White September 28, 2005 [removed]

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2005-09-26 12:56:20
824HashKeeper / National Software Reference Library / Computer file / Computer security / Hash list / Computing / Hashing / Cryptographic hash functions / Error detection and correction

2003 CYBER CRIME CONFERENCE Effectiveness of Hash Sets Douglas White National Institute of Standards & Technology

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2003-12-09 19:03:52
825SHA-2 / SHA-1 / MD5 / Sha1sum / Md5sum / Checksum / Hash function / Public key fingerprint / Tiger / Cryptographic hash functions / Cryptography / Computing

PDF Document

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2003-08-28 10:36:40
826Cryptographic hash functions / Key management / Time / Code signing / Public key certificate / Timestamp / SHA-2 / SHA-1 / PKCS / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-06-13 14:10:10
827Sha / Computing / Cryptographic hash functions / SHA-2 / SHA-1

Release Notes: DTrade v.3.0 November 22, 2013 Contents This document provides specific information for the release of DTrade v.3.0.

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2013-11-21 16:15:48
828Public-key cryptography / Symmetric-key algorithm / Institute for Applied Information Processing and Communications / Block cipher / Key size / RIPEMD / Key / Message authentication code / PKCS / Cryptography / Key management / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2009-09-09 11:04:53
829Cryptographic hash functions / Hashing / Message authentication codes / SHA-2 / SHA-1 / FIPS 140-2 / Secure Hash Standard / NIST hash function competition / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptography standards

ITL Bulletin, May 2012, Secure Hash Standard: Updated Specifications Approved and Issued as Federal Information Processing Standard (FIPS[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:22:13
830Mathematics / Keccak / NIST hash function competition / Joan Daemen / SHA-1 / Cryptol / Function / MD5 / Preimage attack / Cryptography / Error detection and correction / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-29 09:04:53
UPDATE