SHA-2

Results: 893



#Item
491SHA-2 / Computing / Cryptographic hash functions / SHA-1 / CTC

CTC PROJECT ALLOCATIONS FOR JUNE 2014 PPNO Project # Program/Year Allocation Amount Prgm’d Amount

Add to Reading List

Source URL: dot.ca.gov

Language: English - Date: 2014-06-27 10:34:09
492SHA-1 / Digital Signature Algorithm / Secure Hash Standard / Data Encryption Standard / Hash function / MD4 / SHA-2 / MD5 / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS[removed]Secure Hash Standard Page 1 of 21 Return to the FIPS Home Page

Add to Reading List

Source URL: www.sos.state.co.us

Language: English - Date: 2014-10-31 23:49:20
493Hashing / Search algorithms / Keccak / SHA-2 / Hash function / SHA-1 / Password / Salt / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {bo.zhu,x5fan,ggong}@uwaterloo.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-12 12:07:46
494Packaging / Hazel-Atlas Glass Company / Wheeling /  West Virginia / Mason jar / Zanesville /  Ohio / Bottle / Glass / Gorsuch / Jar / Technology / Containers / Glass bottles

2 July-August 2008 Bottles and Extras

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2010-09-30 17:39:26
495Cryptographic hash functions / Road surface / Road / SHA-2 / Kentucky Route 9 / Shoulder / Traffic light / Transport / Land transport / Road transport

CTC PROJECT ALLOCATIONS LIST AUGUST[removed]Project # Allocation Amount Recipient RTPA/CTC

Add to Reading List

Source URL: dot.ca.gov

Language: English - Date: 2014-08-22 10:36:37
496Preimage attack / NIST hash function competition / SHA-1 / Hash function / Crypt / SHA-2 / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Cryptography Research and Evaluation Committees

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:12
497Road transport / SHA-1 / SHA-2 / CTC / Segregated cycle facilities / Road surface / Kentucky Route 9 / Electronic Arts / Transport / Cryptographic hash functions / Land transport

CTC PROJECT ALLOCATION LIST FOR MARCH 2014 Project # Allocation Amount Recipient RTPA/CTC Dist-Co-Rte

Add to Reading List

Source URL: dot.ca.gov

Language: English - Date: 2014-03-21 17:26:21
498Containers / Bottles / Milk bottle / Beer bottle / Polyethylene terephthalate / Mason jar / Wine bottle / Glass / Knox Glass Bottle Company / Technology / Glass bottles / Packaging

2 Winter 2005 The Dating Game by Bill Lockhart, Bill Lindsey, David Whitten and Carol Serr

Add to Reading List

Source URL: www.sha.org

Language: English - Date: 2010-09-30 17:40:09
499Cryptographic hash functions / SHA-2 / Kentucky Route 9 / CTC / Road surface / Highway / Transport / Road transport / Land transport

CTC PROJECT ALLOCATION LIST – MAY 2014 Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: dot.ca.gov

Language: English - Date: 2014-05-23 14:05:31
500Advanced Encryption Standard / Hashing / CRYPTREC / SHA-2 / National Security Agency / SHA-1 / Crypt / NESSIE / Secure Hash Standard / Cryptography / Cryptographic hash functions / Cryptography standards

X-Sieve: CMU Sieve[removed]Subject: Hash Algorithm Requirements and Evaluation Criteria. Date: Tue, 24 Apr[removed]:33:[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:18:28
UPDATE