Cryptographic hash functions
Computing
FIPS 140
Cryptographic software
SHA-2
SHA-1
HMAC
Cryptography
Error detection and correction
Cryptography standards