SHA-1

Results: 1300



#Item
41Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
42Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
43Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

Ciena Corporation Ciena 6500 Flex3 WaveLogic 3e OCLD Encryption Module Hardware Version: 1.0 with PCB P/N NTK539QS-220 Firmware Version: 2.00

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-28 11:33:56
44Microsoft Word - Indo-US-Workshop-jaja.doc

Microsoft Word - Indo-US-Workshop-jaja.doc

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2009-05-12 14:48:13
45LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
46FIPSValidation Process*  FIPSSections and Security Levels Security Levels  Sections

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
47Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13
48Reducing Replication Bandwidth for Distributed Document Databases Lianghong Xu Andrew Pavlo

Reducing Replication Bandwidth for Distributed Document Databases Lianghong Xu Andrew Pavlo

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2015-09-03 13:39:36
49The Maryland Department of Transportation’s’ State Highway Administration (SHARoad Ready e‐Brochure A Comprehensive Electronic Guide to SHA Road Construction

The Maryland Department of Transportation’s’ State Highway Administration (SHARoad Ready e‐Brochure A Comprehensive Electronic Guide to SHA Road Construction

Add to Reading List

Source URL: roads.maryland.gov

Language: English - Date: 2016-04-12 16:00:39
50A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha

A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha

Add to Reading List

Source URL: webdocs.cs.ualberta.ca

Language: English - Date: 2009-10-06 18:16:29