NIST

Results: 18894



#Item
371Cryptographic hash functions / NIST hash function competition / SHA-3

SHA-3 Conference, February 2009, Shabal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-05 11:30:32
372

Ed448-Goldilocks, a new elliptic curve Mike Hamburg∗ Abstract As of early June 2015, the Internet Research Task

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-06-12 11:59:36
    373

    Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-06-12 12:08:16
      374Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

      SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

      Add to Reading List

      Source URL: nvlpubs.nist.gov

      Language: English - Date: 2015-08-04 11:34:10
      375Linguistics / Applied linguistics / Corpus linguistics / Computational linguistics / Lexicography / Linguistic Data Consortium / Natural language processing / International Corpus of English / Word-sense disambiguation / Transcription / LDC

      Microsoft PowerPoint - LinguisticResourcesOpenHaRT_presented

      Add to Reading List

      Source URL: www.nist.gov

      Language: English - Date: 2013-09-11 17:51:09
      376

      Diversity and transparency for ECC

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-06-29 08:11:19
        377

        The Smart Grid NIST Smart Grid Standards Process

        Add to Reading List

        Source URL: www.emcs.org

        Language: English - Date: 2015-08-10 15:20:06
          378Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

          FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

          Add to Reading List

          Source URL: nvlpubs.nist.gov

          Language: English - Date: 2015-08-04 11:33:21
          379

          AnswerFinder at TREC 2004 Diego Moll´a and Mary Gardiner Centre for Language Technology Division of Information and Communication Sciences Macquarie University Sydney, Australia

          Add to Reading List

          Source URL: trec.nist.gov

          Language: English - Date: 2005-02-10 13:20:36
            380

            May 29, 2015 ANNOUNCEMENT OF FEDERAL FUNDING OPPORTUNITY (FFO) Economic Analysis of the National Need for Technology Infrastructure to Support the Materials Genome Initiative (MGI) EXECUTIVE SUMMARY •

            Add to Reading List

            Source URL: mgi.nist.gov

            Language: English - Date: 2015-05-29 15:30:29
              UPDATE