SHA-2

Results: 893



#Item
11Cryptography / Public-key cryptography / Signature / Key management / Public key infrastructure / Cryptography standards / Electronic signature / Public key certificate / Qualified electronic signature / Advanced electronic signature / SHA-2 / Digital signature

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-12-09 10:05:11
12Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

The Politics of Cryptography: Bitcoin and The Ordering Machines

Add to Reading List

Source URL: www.iqdupont.com

Language: English - Date: 2015-12-03 10:50:31
13Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
14Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
15Cryptography / Cryptographic hash functions / One-way compression function / Block cipher / SHA-1 / Hash function

An abridged version, reference [2], appears as Advances in Cryptology – CRYPTO ’02, Lecture Notes in Computer Science, Vol. ????, M. Yung, ed., Springer-Verlag. This is the full version. Black-Box Analysis of the Blo

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-06-04 14:04:18
16Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-27 10:26:48
17Cryptography / Cryptographic hash functions / Public-key cryptography / Error detection and correction / Hash function / Digital signature / Parameter / SECG / SHA-2

Elliptic Curve Abe-Okamoto-Suzuki Message Recovery Signature Scheme (ECAOS) Working DraftAugust 25,

Add to Reading List

Source URL: info.isl.ntt.co.jp

Language: English - Date: 2015-03-02 00:44:50
18Diabetes / Metabolic syndrome / Diabetes management / Diabetes mellitus type 1 / Diabetes mellitus / Prediabetes / Abdominal obesity / Glycated hemoglobin / Obesity / Body mass index / Baker IDI Heart and Diabetes Institute / Obesity in Australia

922 ORIGINAL ARTICLE Prevalence of diabetes and its correlates in urban population of Pakistan: A Cross-sectional survey Jamal Zafar,1 Danish Nadeem,2 Shahzad Ali Khan,3 Mudassar Mushtaq Jawad Abbasi,4 Faisal Aziz,5 Sha

Add to Reading List

Source URL: jpma.org.pk

Language: English - Date: 2016-07-04 06:43:59
19Sha Tin District / New Town Plaza / Sha Tin / Sheung Shui / Media in Taiwan

「迪迪熊收納罐」商舖銷售點 Purchase "Reddie Bear" Belly Can at Retail Outlet 由 2015 年 11 月 14日至 2016 年 1 月 2 日,「迪迪熊收納罐 」於以下豐澤發售: During the period of 14 Nove

Add to Reading List

Source URL: web.redcross.org.hk

Language: English - Date: 2015-11-18 22:44:04
UPDATE