SHA-2

Results: 893



#Item
511Cryptographic hash functions / Road surface / Road / SHA-2 / Kentucky Route 9 / Shoulder / Traffic light / Transport / Land transport / Road transport

CTC PROJECT ALLOCATIONS LIST AUGUST[removed]Project # Allocation Amount Recipient RTPA/CTC

Add to Reading List

Source URL: www.caltrans.ca.gov

Language: English - Date: 2014-08-21 16:39:46
512Hashing / SHA-2 / SHA-1 / Search algorithms / Crypt / Secure Hash Standard / NIST hash function competition / Collision attack / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

[Federal Register: September 12, 1997 (Volume 62, Number 177)]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:13:28
513Cryptographic hash functions / SHA-2

PDF Document

Add to Reading List

Source URL: resources.ca.gov

Language: English - Date: 2014-07-30 16:03:18
514

Sifili 19 Lamba 2 (Zul-Hajj[removed]Sha’awal[removed]Oktoba zuwa Nuwamba 2012

Add to Reading List

Source URL: photos.state.gov

Language: Indonesian - Date: 2014-11-11 02:30:00
    515Hashing / SHA-2 / SHA-1 / Collision attack / MD4 / HMAC / RadioGatún / Preimage attack / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Error detection and correction

    NIST recently held a workshop (Oct

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2013-05-07 13:08:30
    516Universal one-way hash function / SHA-1 / SHA-2 / Hash function / Hash list / Cryptographic primitive / Collision / MD5 / One-way function / Cryptographic hash functions / Error detection and correction / Cryptography

    1 Q2S Edon-R, An Infinite Family of Cryptographic Hash Functions

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-20 08:38:20
    517SHA-1 / SHA-2 / Merkle–Damgård construction / Hash function / Crypt / Provably secure cryptographic hash function / Fast Syndrome Based Hash / Cryptographic hash functions / Error detection and correction / Cryptography

    SHA-256 Today and Maybe Something Else in a Few Years: Effects on Research and Design

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-20 08:52:44
    518SHA-1 / SHA-2 / Hash list / Hash function / Merkle–Damgård construction / Crypt / MD5 / NIST hash function competition / RIPEMD / Cryptographic hash functions / Error detection and correction / Cryptography

    Microsoft Word - Workshop 2 proposal.doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-20 08:53:44
    519Cryptographic hash functions / Road surface / Road / SHA-2 / Kentucky Route 9 / Shoulder / Traffic light / Transport / Land transport / Road transport

    CTC PROJECT ALLOCATIONS LIST AUGUST[removed]Project # Allocation Amount Recipient RTPA/CTC

    Add to Reading List

    Source URL: www.dot.ca.gov

    Language: English - Date: 2014-08-22 10:36:37
    520Computer security / Cryptography standards / Microsoft CryptoAPI / FIPS 140-2 / Cryptographic Service Provider / FIPS 140 / SHA-1 / CryptGenRandom / Crypto++ / Cryptography / Cryptographic software / Computing

    Microsoft Word - 01o - TC-SecPol-27.doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-19 01:00:00
    UPDATE