Hashing

Results: 1317



#Item
831Hashing / Hash function / Merkle–Damgård construction / Information retrieval / Artificial intelligence / Applied mathematics / Provably secure cryptographic hash function / Collision resistance / Cryptographic hash functions / Cryptography / Search algorithms

Cryptographic Hash Workshop[removed]Multi-Property-Preserving Hash Domain Extension: The EMD Transform

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:57:42
832Hashing / SHA-2 / SHA-1 / Collision attack / MD4 / HMAC / RadioGatún / Preimage attack / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Error detection and correction

NIST recently held a workshop (Oct

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-07 13:08:30
833Collision / Cyberwarfare / Computing / Computer programming / Cryptographic hash functions / Hashing / MD5

Precise Probabilities for Hash Collision Paths

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:06:26
834Collision resistance / Mathematics / Hash function / SWIFFT / Applied mathematics / Fast Fourier transform / Cyberwarfare / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Digital signal processing

Provably Secure FFT Hashing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:50:36
835Hash function / Information retrieval / Artificial intelligence / Applied mathematics / Cryptographic hash functions / Cryptography / Hashing

Cryptographic Hash Workshop[removed]How to Attack a Hash Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:27:48
836Hashing / Message authentication codes / Padding / Hash function / MD5 / One-way compression function / Cryptography / Error detection and correction / Cryptographic hash functions

Cryptographic Hash Workshop[removed]Enhancing the MD-Strengthening & Designing Scalable 1-Way Hash Families

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:30:02
837Computer architecture / Software / Message authentication codes / Hashing / FIPS 140 / HMAC / Vidyo / Zeroisation / Critical Security Parameter / Cryptography standards / Cryptography / Computing

1B - Vidyo Cryptographic Security Kernel Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-20 10:16:00
838Hashing / Secure communication / HMAC / Cipher suite / SHA-2 / AKA / Secure Shell / Password / Key / Cryptography / Security / Cryptographic protocols

Microsoft Word - 17e - McAfee NetworkSecurityPlatformV6.1 M-8000 P Security Policy V1.12.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-06 11:03:00
839Cryptography / Search algorithms / Computing / Information retrieval / Hash tree / Hash list / Hash function / MD5 / Merkle–Damgård construction / Hashing / Cryptographic hash functions / Error detection and correction

Z:rentWorkding-paperding.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:26:36
840Public-key cryptography / Hashing / Electronic commerce / PKCS / IBM System z10 / RSA / Key size / FIPS 140-2 / SHA-2 / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - PKCS11-FIPS-Security-Policy12.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
UPDATE