SHA-2

Results: 893



#Item
501Hashing / SHA-1 / MD5 / Collision attack / Hash function / HMAC / Collision / MD2 / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Malicious Hashing: Eve’s Variant of SHA-1 Ange Albertini1 , Jean-Philippe Aumasson2 , Maria Eichlseder3 , Florian Mendel3 , and Martin Schl¨affer3 1 Corkami, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 12:54:02
502Preimage attack / GOST / SHA-1 / MD5 / SHA-2 / Hash function / Hash table / Function / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-29 21:47:28
503SHA-2 / Computing / Cryptographic hash functions / CTC / SHA-1

JANUARY 2014 CTC PROJECT ALLOCATION LIST Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: dot.ca.gov

Language: English - Date: 2014-01-31 16:02:39
504Error detection and correction / Message authentication codes / Search algorithms / HMAC / Hash function / Collision / Digital signature / Algorithm / SHA-2 / Cryptography / Hashing / Cryptographic hash functions

Comments on NIST Draft Requirements and Criteria for Hash Algorithm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:56:14
505Hashing / SHA-1 / Hash function / Preimage attack / Collision resistance / Cryptography / Cryptographic hash functions / Search algorithms

X-Sieve: CMU Sieve 2.2 DKIM-Signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:to:subject:mimeversion:content-type; b=hpQBvkv1eVIC20ITx1GF9QzMkMgj4

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:59:50
506Hashing / Crypt / Hash function / SHA-2 / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Fri, 13 Apr 2007 15:43:28 +0300 From: Carmi Gressel Subject: Hash Algorithm Requirements and Evaluation Criteria To: william.burr@nist.gov, hash-function@nist.gov X-Mai

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:27:14
507Computer-mediated communication / Cryptographic hash function / MD5 / LISTSERV / SHA-2 / Digital preservation / Checksum / Records management / H-Net / Computing / Email / Internet

H-Net Preservation Improvements

Add to Reading List

Source URL: www.h-net.org

Language: English - Date: 2008-08-18 14:18:35
508Electronic commerce / Identity management / Credential / SHA-2 / Proof of knowledge / Pseudorandom number generator / RSA / SHA-1 / Cryptography / Cryptographic hash functions / Cryptographic protocols

Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards⋆ Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers Radboud University Nijmegen, ICIS DS, Nijmegen, The Netherlands {a.delapiedra,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 05:32:30
509Error detection and correction / Search algorithms / Hash chain / Lamport signature / Hash function / Password / Hash tree / Hash / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new ideas for decre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 05:03:49
510Cryptographic Module Validation Program / Advanced Encryption Standard / FIPS 140 / Key size / SHA-2 / Key management / Federal Information Processing Standard / Information security / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / FIPS 140-2

[removed][removed][removed]New York State Information Technology Standard No: NYS-S14-007

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-03-25 12:06:25
UPDATE