SHA-2

Results: 893



#Item
401Transport in Hong Kong / MTR Corporation / Kowloon–Canton Railway / KCRC / Sha Tin to Central Link / Ma On Shan Line / Citylink Plaza / West Rail Line / Kowloon Southern Link / Hong Kong / MTR / Kowloon–Canton Railway Corporation

KOWLOON-CANTON RAILWAY CORPORATION Chairman’s Statement 2

Add to Reading List

Source URL: www.kcrc.com

Language: English - Date: 2014-08-13 05:32:08
402Kowloon Station / Tuen Mun Town Plaza / Austin Station / New Territories / Sheung Shui / Tuen Mun Station / Sha Tin / Kowloon / Caritas Hong Kong / Hong Kong / Tuen Mun / Kwun Chung

2 Application for New Taxi Driver Identity Plate

Add to Reading List

Source URL: www.qtssc.org.hk

Language: English - Date: 2011-04-21 00:23:40
403KCR East Rail / KCR / Sha Tau Kok Railway / Kowloon–Canton Railway / Hong Kong Railway Museum / Fanling Station / W. G. Bagnall / Hong Kong / Sha Tau Kok / Rail transport in Hong Kong

Microsoft Word - Narrow gauge Eng_2.doc

Add to Reading List

Source URL: www.heritagemuseum.gov.hk

Language: English
404Haya Rashed Al-Khalifa / Sha Zukang / Scientific opinion on climate change

27 August[removed]Excellency, I have the pleasure to enclose herewith an informal summary of the proceedings of the fourth thematic debate on “Climate Change as a Global Challenge” that took place on 31July -2 August 2

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2007-08-27 16:54:54
405Hashing / Hash function / Optimal asymmetric encryption padding / Crypt / Full Domain Hash / SHA-2 / Lamport signature / Cryptography / Cryptographic hash functions / Search algorithms

Extendable-Output Functions (XOFs) Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:38
406Keccak / NIST hash function competition / SHA-2 / Preimage attack / Merkle–Damgård construction / Crypt / Hash tree / SHA-1 / Secure Hash Standard / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:37
407KMAC / SHA-2 / CMAC / Computing / Internet protocols / Computer programming / Mathematics / Message authentication codes / Hashing / HMAC

SHA3-based MACs Ray Perlner Computer Security Division, NIST [removed] SHA[removed]Workshop August 22, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:52:10
408Sha Tin / Latin alphabets / Chinese romanization

Sha Tin Area 65 (Site 16) : about 2.79 ha (Plan A16) Area No. of Building(s) Surveyed : N.A. : 1 building for temporary Construction Industry Council Training

Add to Reading List

Source URL: www.pland.gov.hk

Language: English - Date: 2014-06-30 12:03:49
409Cryptographic hash functions / Cryptography standards / Elliptic curve cryptography / SHA-2 / HMAC / PKCS / SHA-1 / Smart card / PCI Express / Cryptography / Cryptographic software / Error detection and correction

TrustWay Crypto PCI: an EAL4+ Common Criteria certified, ANSSI-qualified, cryptographic resource TrustWay® Crypto PCI is a cryptographic solution – 100% developed and manufactured in France by Bull – featuring the l

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2011-05-09 09:52:35
410SHA-1 / SHA-2 / Institute for Applied Information Processing and Communications / RIPEMD / Krypto / Vincent Rijmen / Collision attack / Sha / Cryptographic hash functions / Cryptography / MD4

Analysis of Step-Reduced SHA-256

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-19 06:40:58
UPDATE