Back to Results
First PageMeta Content
Hashing / Message authentication codes / SHA-2 / HMAC / SHA-1 / Collision resistance / Collision / Preimage attack / NIST hash function competition / Cryptography / Error detection and correction / Cryptographic hash functions


NIST SP[removed]Draft, Recommendation for Applications Using Approved Hash Algorithms
Add to Reading List

Document Date: 2013-04-29 15:03:49


Open Document

File Size: 452,08 KB

Share Result on Facebook

City

Hash / /

Company

Securing Agency Information Systems / /

Facility

National Institute of Standards and Technology / /

IndustryTerm

hash-based key derivation algorithms / invertible symmetric key cryptographic algorithm / cryptographic applications / Secure hash algorithms / cryptographic algorithms / hash algorithms / transformation algorithm / hash algorithm / digital signature applications / security systems / cryptographic algorithm / /

Organization

National Institute of Standards and Technology / CSRC / NIST Computer Security Division / U.S. Department of Commerce / office of Management and Budget / /

Person

Patrick Gallagher / John Kelsey / Lily Chen / Daniel Brown / Ray Perlner / Morris Dworkin / Quynh Dang / Praveen Gauravaram / Elaine Barker / Hugo Krawczyk / Donna F. Dodson / Rebecca Blank / William E. Burr / W. Timothy Polk / Andrew Regenscheid / /

Position

author / Acting Secretary / Secretary of Commerce / Director / Acknowledgements The author / Secretary of Commerce under statutory authority / Under Secretary of Commerce / federal official / /

PublishedMedium

Public Law / /

Technology

Derivation Key Keying Material MAC algorithm / hash algorithm / Information Technology / Approved hash algorithms Hash algorithms / seven approved hash algorithms / Approved Hash Algorithms / hash-based key derivation algorithms / Block cipher / hash algorithms / Secure hash algorithms / secret key / unvarying transformation algorithm / Digital Signature / invertible symmetric key cryptographic algorithm / cryptographic algorithm / 7 Approved Hash Algorithms / /

URL

http /

SocialTag