Hashing

Results: 1317



#Item
851Cryptography / Cryptographic hash functions / Fourier analysis / Digital signal processing / Unitary operators / Fast Fourier transform / Lattice problem / Discrete Fourier transform / Collision resistance / Mathematics / Algebra / Mathematical analysis

Cryptographic Hash Workshop[removed]Provably Secure FFT Hashing Paper

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:51:28
852Computer security / HMAC / Hashing / FIPS 140-2 / FIPS 140 / SHA-2 / Authentication / Cryptography / Cryptography standards / Security

FIPS[removed]Level 2 Security Policy For SAMSUNG SSD PM810 SED FIPS 140 Module Document Version 0.6

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-11 17:46:18
853Cryptographic hash functions / Internet / Cryptographic protocols / Hashing / Error detection and correction / Steven M. Bellovin / Domain Name System Security Extensions / SHA-1 / MD5 / Cryptography / Computing / Internet protocols

Cryptographic Hash Workshop[removed]Deploying New Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:02:34
854Hashing / HAVAL / Signcryption / PKC / Cryptographic hash function / Cryptography / Year of birth missing / Yuliang Zheng

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:29:14
855Error detection and correction / SHA-2 / SHA-1 / MD5 / Digital signature / Hash list / Hash function / Trusted timestamping / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

Long-lived digital integrity using short-lived hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:39:50
856Hashing / Hash function / Applied mathematics / Truncation / SHA-2 / Mathematics / Artificial intelligence / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Search algorithms

SHA-160: A Truncation Mode for SHA256 (and most other hashes) John Kelsey, NIST Halloween Hash Bash 2005

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:30:12
857Hashing / Error detection and correction / Hash function / Computing / SHA-1 / Computer programming / Bit array / Information retrieval / Cryptographic hash functions / Cryptography / Search algorithms

Cryptographic Hash Workshop[removed]LASH Presentation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:05:44
858Cryptography standards / Hashing / Cryptographic hash functions / Advanced Encryption Standard / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Error detection and correction / Cryptographic software

Microsoft Word - 05a - Security_Policy_Model-Open SSL_HP-_Ver1 0r4_.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
859Collision / Hashing

TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 N LAMAR BLVD • BOX 4087 • AUSTIN, TEXAS[removed][removed]www.dps.texas.gov

Add to Reading List

Source URL: www.dps.texas.gov

Language: English - Date: 2014-06-03 15:19:45
860Hashing / Cryptographic protocols / Advanced Encryption Standard / FIPS 140-2 / FIPS 140 / Critical Security Parameter / Cryptographic hash function / Zeroisation / Loadable kernel module / Cryptography / Computing / Cryptography standards

Microsoft Word - 04b - Kernel Crypto Module Security Policy_IGL updates[removed]doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
UPDATE