SHA-2

Results: 893



#Item
521Cryptosystem / Key size / SHA-1 / Data Encryption Standard / FIPS 140-2 / Message authentication code / Advanced Encryption Standard / Public-key cryptography / Transport Layer Security / Cryptography / Key management / Cryptographic hash functions

Securit-e-Doc® SITT® CryptoSystem FIPS[removed]Non-Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
522Hashing / Secure communication / HMAC / Cipher suite / SHA-2 / AKA / Secure Shell / Password / Key / Cryptography / Security / Cryptographic protocols

Microsoft Word - 17e - McAfee NetworkSecurityPlatformV6.1 M-8000 P Security Policy V1.12.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-06 11:03:00
523Public-key cryptography / Hashing / Electronic commerce / PKCS / IBM System z10 / RSA / Key size / FIPS 140-2 / SHA-2 / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - PKCS11-FIPS-Security-Policy12.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-29 00:00:00
524SHA-1 / SHA-2 / Differential cryptanalysis / SHACAL / Block cipher / MD5 / Collision attack / Collision resistance / HAVAL / Cryptography / Cryptographic hash functions / Hashing

Cryptographic Hash Workshop[removed]Some applications of the Biham-Chen attack to SHA-like hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:28:42
525Internet protocols / Secure communication / Electronic commerce / HMAC / Cipher suite / FIPS 140 / SHA-2 / RSA / Advanced Encryption Standard / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - 4g - McAfee NSP V6 1 IPS-NAC SecurityPolicy v1_11_HL2011[removed]Copy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-15 11:42:00
526Cryptography / Collision resistance / Hash function / Hash list / SHA-2 / Collision / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Hashing

Classification of Hash Functions Suitable for Real-life Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:53:32
527Key management / HMAC / Cryptographic hash function / SHA-2 / FIPS 140-2 / Key / Advanced Encryption Standard / Cryptography / Hashing / Message authentication codes

Microsoft Word - 01d - EPCL_Security_Policy_2010-CCS RedlinedD4.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
528Hash function / MD5 / Collision resistance / SHA-1 / MD4 / RadioGatún / Block cipher / SHA-2 / Collision / Cryptographic hash functions / Error detection and correction / Cryptography

Cryptographic Hash Workshop[removed]RFadioGatun, a belt-and-mill hash function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:22:30
529Wang Xiaoyun / Computer programming / MD5 / Computing / Chaining / Frances Yao / Logic programming / Mathematics / SHA-2 / Cryptographic hash functions / SHA-1 / Behaviorism

Microsoft PowerPoint - SHA1-new-Result-NIST

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:23:36
530SHA-1 / MD5 / Computing / Applied mathematics / MD4 / Hamming weight / Gaussian elimination / Cryptographic hash functions / Mathematics / SHA-2

Gr¨ obner Basis Based Cryptanalysis of SHA-1 Makoto Sugita ∗

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:15:48
UPDATE