Hashing

Results: 1317



#Item
981Hashing / Microsoft CryptoAPI / Transport Layer Security / Key / Public-key cryptography / Symmetric-key algorithm / Cryptographic hash function / CryptGenRandom / Password / Cryptography / Key management / Cryptographic software

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
982Cryptographic hash functions / Search algorithms / Bloom filter / Hash function / Fingerprint / Crypt / Rabin fingerprint / SHA-1 / Feature selection / Cryptography / Hashing / Error detection and correction

Chapter 8 DATA FINGERPRINTING WITH SIMILARITY DIGESTS Vassil Roussev Abstract

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
983Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
984Cryptography standards / Hashing / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / SHA-1 / Block cipher / Key size / Padding / Cryptography / Cryptographic hash functions / Error detection and correction

FIPS140-2 Security Policy for IBM CryptoLite in C (CLiC) FIPS140-2 Security Policy for CryptoLite in C (CLiC)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
985Internet protocols / Cryptographic protocols / Hashing / Secure communication / FIPS 140-2 / FIPS 140 / HMAC / Extensible Threat Management / Transport Layer Security / Cryptography / Computing / Cryptography standards

Security Policy XTM - V2.2.7

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-18 15:57:36
986Search algorithms / Hashing / Electronic engineering / Digital media / Mobile phone / Cryptographic hash function / Hash function / V Cast / Technology / ITunes / Motorola RAZR

SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, VOL. 3, NO. 1, JUNE 2009 ISSN# [removed]Hashing Techniques for Mobile Device Forensics Shira Danker

Add to Reading List

Source URL: www.ssddfj.org

Language: English - Date: 2013-04-19 15:56:32
987Windows / Hashing / Microsoft CryptoAPI / Key generation / Key / Transport Layer Security / Public-key cryptography / Symmetric-key algorithm / Data Protection API / Cryptography / Cryptographic software / Key management

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
988Key management / Cryptographic software / FIPS 140-2 / FIPS 140 / HMAC / Cryptographic Service Provider / Key generation / Zeroisation / Critical Security Parameter / Cryptography / Cryptography standards / Hashing

F-Secure Cryptographic Service Provider Security Policy 1 F-Secure Corporation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
989Computer security / Computing / HMAC / Hashing / Elliptic curve cryptography / FIPS 140-2 / FIPS 140 / Cryptlib / Crypto++ / Cryptography / Cryptographic software / Cryptography standards

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy (SPARC T4) Level 1 with Level 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-25 07:06:30
990Computer programming / Software engineering / Search algorithms / Spam filtering / Cryptographic hash functions / Bloom filter / Hash function / Type I and type II errors / G factor / Hashing / Computing / Error detection and correction

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
UPDATE