SHA-2

Results: 893



#Item
411Cryptography standards / PKCS / SHA-2 / Smart card / Elliptic curve cryptography / HMAC / Network Security Services / Cryptlib / Cryptography / Cryptographic software / Public-key cryptography

TrustWay® box, the same encryption device, whatever platform or OS you use TrustWay® box is an encryption device – developed 100% by Bull and manufactured in France – which features the very latest technological de

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-10-21 08:54:15
412Embedded systems / Fabless semiconductor companies / Field-programmable gate array / Application-specific integrated circuit / Serial Peripheral Interface Bus / Joint Test Action Group / SHA-2 / Xilinx / Verilog / Electronic engineering / Electronics / Integrated circuits

© 2011 Center for Embedded Systems for Critical Applications NIST SHA-3 ASIC User Guide -- How to Test NIST SHA-3 Competition Five Finalists on a Chip (Version 1.1)

Add to Reading List

Source URL: rijndael.ece.vt.edu

Language: English - Date: 2011-11-29 15:28:31
413Hashing / Enterprise application integration / Service-oriented architecture / SOA Security / HMAC / SHA-2 / Software engineering / Cryptography standards / Computing / Web services / Information technology management

TrustWay® box XML Gateway Bull and Vordel, partners in the supply of a certified, high-security Service-Oriented Architecture governance solution The TrustWay box XML Gateway guarantees a very high level of security a

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-11-29 07:31:10
414Sha Tin / MTR / Poster session / Physical geography / Academia / Tai Po / Tai Po District

Conference Program Hong Kong October 2-4, 2014 HKICSS Hong Kong International Conference on Social Science

Add to Reading List

Source URL: www.accaws.org

Language: English - Date: 2014-09-24 00:34:30
415SHA-2

Society for Historical Archaeology 2013 Conference on Historical and Underwater Archaeology Leicester, UK January 9-13, 2012

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2012-09-05 19:56:57
    416Cryptographic hash functions / HMAC / SHA-1 / MD5 / Collision attack / Hash function / MD4 / Collision resistance / SHA-2 / Error detection and correction / Cryptography / Hashing

    Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb

    Add to Reading List

    Source URL: www.jucs.org

    Language: English - Date: 2008-09-17 07:43:00
    417Containers / Antiques / Gerresheimer / Heye / Beer bottle / Bottle / Wine bottle / Pontil mark / Beer / Technology / Glass bottles / Packaging

    2 January-February 2008 Bottles and Extras

    Add to Reading List

    Source URL: www.sha.org

    Language: English - Date: 2010-09-30 17:40:33
    418Clarion County /  Pennsylvania / Knox Glass Bottle Company / Containers / Milk bottle / Bottle / Knox / Glass / Beer bottle / Keystone / Technology / Packaging / Glass bottles

    2 Winter 2004 Bottles and Extras

    Add to Reading List

    Source URL: www.sha.org

    Language: English - Date: 2010-09-30 17:39:11
    419CTC / SHA-2 / Computer programming / C / Computing / Cryptographic hash functions / Software engineering

    Microsoft Word - CTC September Project Allocations List.docx

    Add to Reading List

    Source URL: www.dot.ca.gov

    Language: English - Date: 2012-02-22 15:50:47
    420Chemistry / Cola / Containers / Soft drinks / Coca-Cola / Milk bottle / Bottle / Michael Joseph Owens / Bottling company / Technology / Packaging / Glass bottles

    2 Winter 2006 Bottles and Extras

    Add to Reading List

    Source URL: www.sha.org

    Language: English - Date: 2010-09-30 17:36:58
    UPDATE