SHA-2

Results: 893



#Item
31FIPSValidation Process*  FIPSSections and Security Levels Security Levels  Sections

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
32Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13
33yescrypt - a Password Hashing Competition submission  Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-10-25 04:56:20
34A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha

A Heuristic Routing Mechanism Using a New Addressing Scheme M. Ravanbakhsh1, Y. Abbasi-Yadkori1, M. Abbaspour1,3, H. Sarbazi-Azad1,2 1 IPM, School of Computer Science, Tehran, Iran Department of Computer Engineering, Sha

Add to Reading List

Source URL: webdocs.cs.ualberta.ca

Language: English - Date: 2009-10-06 18:16:29
    35Digital Library 2.0 for Educational Resources Monika Akbar1 , Weiguo Fan1 , Clifford A. Shaffer1 , Yinlin Chen1 , Lillian Cassel2 , Lois Delcambre3 , Daniel D. Garcia4 , Gregory W. Hislop5 , Frank Shipman6 , Richard Fu

    Digital Library 2.0 for Educational Resources Monika Akbar1 , Weiguo Fan1 , Clifford A. Shaffer1 , Yinlin Chen1 , Lillian Cassel2 , Lois Delcambre3 , Daniel D. Garcia4 , Gregory W. Hislop5 , Frank Shipman6 , Richard Fu

    Add to Reading List

    Source URL: www.cs.utep.edu

    Language: English - Date: 2011-10-12 16:36:05
    36Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

    Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2015-02-03 09:25:05
    37Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

    Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-10-16 08:19:35
    38menu_SHA_2016_maijs_trim-2.pdf

    menu_SHA_2016_maijs_trim-2.pdf

    Add to Reading List

    Source URL: www.steikuhaoss.lv

    Language: Latvian - Date: 2016-05-03 15:18:02
      39Cryptanalysis of Dynamic SHA(2) Jean-Philippe Aumasson1,∗ , Orr Dunkelman2,† , Sebastiaan Indesteege3,4,‡ , and Bart Preneel3,4 1 FHNW, Windisch, Switzerland. ´

      Cryptanalysis of Dynamic SHA(2) Jean-Philippe Aumasson1,∗ , Orr Dunkelman2,† , Sebastiaan Indesteege3,4,‡ , and Bart Preneel3,4 1 FHNW, Windisch, Switzerland. ´

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:46:39
        40Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

        Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

        Add to Reading List

        Source URL: mitls.org

        Language: English - Date: 2016-01-06 07:34:05