Hashing

Results: 1317



#Item
861Hashing / BlackBerry / Embedded operating systems / Smartphones / FIPS 140-2 / BlackBerry OS / FIPS 140 / HMAC / SHA-2 / Cryptography / Computing / Cryptography standards

FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-11-30 00:00:00
862Search algorithms / Error detection and correction / Birthday attack / Hash function / Random oracle / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

2nd Cryptographic Hash Workshop[removed], Santa Barbara, California) How to Construct Double-Block-Length Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:51:10
863Security / Hashing / Cryptographic nonce / HTTP / Cryptographic hash function / Block cipher modes of operation / HMAC / Password / Authentication / Cryptography / Cryptographic protocols / Message authentication codes

M3DA Security Extension This is a draft document M3DA Security Extension Document history Date

Add to Reading List

Source URL: wiki.eclipse.org

Language: English - Date: 2013-01-28 15:59:57
864Cryptographic hash functions / Search algorithms / Collision resistance / Hash function / Hash list / Advanced Encryption Standard / Cryptography / Hashing / Error detection and correction

Hash Workshop Wrapup Agreement • Don’t really know what we are doing – AES competition was a learning experience – Big safety margin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:04:50
865Search algorithms / Collision resistance / Hash function / Digital signature / Universal one-way hash function / SHA-1 / Collision attack / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

http://www.ietf.org/internet-drafts/draft-irtf-cfrg-rhash-00.txt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:38:38
866Hashing / Search algorithms / Hash function / Preimage attack / Collision attack / SHA-1 / SHA-2 / Padding / MD5 / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]A Framework for Iterative Hash Functions - HAIFA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:22:00
867Computer programming / Arrays / Information science / Bloom filter / Hash table / Hash function / Lookup table / Bit array / Trie / Hashing / Computing / Search algorithms

Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines Flavio Bonomi Michael Mitzenmacher∗

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2006-06-26 11:36:24
868Electronics / Bloom filter / Hashing / Network topology / Link-state routing protocol / IP traceback / Network coding / Routing / Topology / Computing / Network architecture / Routing algorithms

Evaluation of Path Recording Techniques in Secure MANET Danai Chasaki and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA, USA Email: {dchasaki,wolf}@ecs.umass.edu

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:34
869NIST hash function competition / Hashing / SHA-2 / Preimage attack / Grøstl / Keccak / Collision attack / Collision resistance / Advanced Encryption Standard / Cryptography / Error detection and correction / Cryptographic hash functions

SHA-3 Finalist Grostl: Round 3 Public Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-29 09:20:30
870Hashing / SHA-1 / MD4 / SHA-2 / MD5 / Crypt / Collision attack / Collision resistance / Preimage attack / Cryptography / Cryptographic hash functions / Error detection and correction

Find Me a Hash Susan Landau W e’re accustomed to hearing about

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2006-02-08 14:25:14
UPDATE