SHA-2

Results: 893



#Item
441Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Cryptographic hash functions / Open Source Software Institute / FIPS 140 / SHA-1 / Advanced Encryption Standard / AES implementations / Cryptography standards / Cryptography / Cryptographic software

OpenSSL FIPS Object Module Version[removed]By the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2008-02-10 13:28:55
442Error detection and correction / Cryptographic hash functions / Advanced Encryption Standard / OpenSSL / FIPS 140-2 / HMAC / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Cryptographic software / Cryptography standards

OpenSSL FIPS Object Module Version[removed]By the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2011-05-12 08:55:47
443Threefish / Skein / NIST hash function competition / SHA-1 / SHA-2 / Tiny Encryption Algorithm / MD5 / Differential cryptanalysis / Churning / Cryptography / Error detection and correction / Cryptographic hash functions

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-24 03:49:53
444Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak Computer Science & Engineering Department, Haldia Institute of Technology, Haldia, India – 721657, E-mail – [removed] Abstract:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-06 05:29:27
445Maryland Route 198 / Maryland Route 144 / Interstate 95 in Maryland / U.S. Route 1 in Maryland / Maryland Route 28 / U.S. Route 29 in Maryland / Maryland Route 2 / Baltimore–Washington Parkway / Maryland Route 75 / Maryland / Transportation in the United States / Interstate 695

*Restrictions are subject to change at any time MARYLAND ROUTE RESTRICTIONS Bridge Under Clearance/Overhead Clearance Information February 4, 2015 Page 1 of 15

Add to Reading List

Source URL: www.sha.maryland.gov

Language: English - Date: 2015-02-04 16:33:04
446SHA-2 / Secure Shell / Password / Cryptographic hash function / Cryptographic software / Hash function / Crypt / Key / Cryptlib / Cryptography / Hashing / HMAC

Why is My App So Slow? (hint – it’s probably MySQL)

Add to Reading List

Source URL: doboard.com

Language: English - Date: 2009-04-24 14:18:17
447Ontology / Science / Semantic Web / Bioinformatics / Annotation / Writing / Markup language / Semantic integration / Data integration / Information / Data management / Data

Deep Annotation for Information Integration Siegfried Handschuh1 , Steffen Staab1,2 , Raphael Volz1 , Leo Meyer1 1 Institute AIFB, University of Karlsruhe, 76128 Karlsruhe, Germany {sha, sst, rvo}@aifb.uni-karlsruhe.de

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2003-05-02 04:46:44
448FIPS 140-2 / Cryptographic primitive / Cryptographic hash function / Block cipher / Protection Profile / FIPS 140 / Key size / SHA-2 / PKCS / Cryptography / Cryptography standards / Common Criteria

Ärendetyp: 6 SP-188 Diarienummer 13FMV128772:1 Dokument ID FMVID[removed]

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2013-06-25 04:56:56
449CTC / Program management / Computing / Cryptographic hash functions / SHA-1 / SHA-2

CTC Financial Vote List 2.5 Highway Financial Matters January 22, 2015

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2015-01-08 18:43:06
450Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
UPDATE