SHA-2

Results: 893



#Item
451Hashing / Search algorithms / Password / SHA-2 / Hash function / Crypt / Salt / PBKDF2 / Bcrypt / Cryptography / Cryptographic hash functions / Cryptographic software

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
452Paper art / Papier-mâché / Watercolor painting / Flour / Teaspoon / Kneading / Paint / Tempera / Visual arts / Food and drink / Baking

From Playdough to Papier-Mache: Art Recipes for Fun Salt & Flour Dough Mix 2 parts salt and 1 part flour. Add water until mixture becomes doughy. Food colouring may be added to dough. This is a good recipe for beads. Sha

Add to Reading List

Source URL: www.manitobaparentzone.ca

Language: English - Date: 2015-01-13 10:05:14
453Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / HMAC / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
454Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / Cryptographic Module Validation Program / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 14:34:44
455Hardware security module / FIPS 140 / PKCS / Key generation / HMAC / Key Wrap / SHA-2 / Advanced Encryption Standard / Zeroisation / Cryptography / Cryptography standards / Key management

Ultra Electronics AEP’s Advanced Configurable Cryptographic Environment (ACCE) v3 HSM Crypto Module FIPS[removed]Non-Proprietary Security Policy Issue[removed]Copyright © 2014 Ultra Electronics AEP

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-11 12:59:58
456Public-key cryptography / Cryptographic software / Secure communication / Transport Layer Security / SHA-2 / Digital signature / Key / IPsec / X.509 / Cryptography / Cryptographic protocols / Internet protocols

Microsoft Word - CSG-01_S_english.DOC

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2015-01-25 11:42:22
457Cryptographic software / Cryptographic hash functions / Key generation / FIPS 140 / SHA-2 / SHA-1 / Key / Microsoft CryptoAPI / CRYPTREC / Cryptography / Key management / Cryptography standards

Microsoft Word - Proofpoint-Fips[removed]C++-Security-Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-13 13:30:44
458Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
459

ジオトラスト SSLサーバ証明書(SHA-2):携帯電話端末 動作確認結果一覧 ■携帯電話 (3G) ジオトラスト デバイス種類

Add to Reading List

Source URL: www.geotrust.co.jp

Language: Japanese - Date: 2014-10-06 03:14:03
    460Haplotype / Genetic association / Balitoridae / Cyprinidae / Classical genetics / Fish / Genetic genealogy

    Publications 1. Sha Q, Zhang S. Test of rare variant association based on affected sib-pairs. Eur J Hum Genet, doi: [removed]ejhg[removed]Epub ahead of print] 2. Sha Q, Zhang S[removed]A rare variant association test bas

    Add to Reading List

    Source URL: www.math.mtu.edu

    Language: English - Date: 2014-12-31 12:51:57
    UPDATE